Static task
static1
Behavioral task
behavioral1
Sample
dc36c00644bc994d5bb02aa68b3cd866e22bf8f55903bb7ca785068037531bb8.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
dc36c00644bc994d5bb02aa68b3cd866e22bf8f55903bb7ca785068037531bb8.exe
Resource
win10-20231215-en
General
-
Target
dc36c00644bc994d5bb02aa68b3cd866e22bf8f55903bb7ca785068037531bb8
-
Size
345KB
-
MD5
7a861d2a7d07c0efa9e429d6bbad1ffc
-
SHA1
f1eabb477e4dffd1b6f6d145e91211883123bd6d
-
SHA256
dc36c00644bc994d5bb02aa68b3cd866e22bf8f55903bb7ca785068037531bb8
-
SHA512
a98f9c382547df8d1502b6d3f05be4dccc80c0fdbbbb62446a0d42ff89cd1a8f868b57c9f665602bac7b5ea5e64255bde8da92763b216a6988346ab6e5a2fece
-
SSDEEP
6144:l7fbsgL+pivdR8DusUhdGrXMWiB0H440/Q1kDc:lX7+pivj8DkVB0Y40YeY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource dc36c00644bc994d5bb02aa68b3cd866e22bf8f55903bb7ca785068037531bb8
Files
-
dc36c00644bc994d5bb02aa68b3cd866e22bf8f55903bb7ca785068037531bb8.exe windows:5 windows x86 arch:x86
bf14849f4ab78a7abfe404cb860b648b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
MoveFileExA
FindResourceW
HeapAlloc
InterlockedIncrement
OpenJobObjectA
SetDefaultCommConfigW
CreateDirectoryW
GetTickCount
GetProcessHeap
GetConsoleAliasesLengthA
TzSpecificLocalTimeToSystemTime
GetSystemTimes
WideCharToMultiByte
GetVolumeInformationA
LoadLibraryW
CompareStringW
GetStartupInfoW
WritePrivateProfileStringW
GetLocaleInfoA
GetConsoleAliasesW
GlobalUnfix
SetCurrentDirectoryA
GetLastError
GetProcAddress
CreateNamedPipeA
ResetEvent
OpenWaitableTimerA
GetAtomNameA
LoadLibraryA
LocalAlloc
SetProcessWorkingSetSize
FreeEnvironmentStringsW
GetCurrentDirectoryA
EndUpdateResourceA
FileTimeToLocalFileTime
IsValidLocale
EnumSystemLocalesA
GetModuleHandleExA
FlushFileBuffers
EnumDateFormatsExW
HeapFree
EncodePointer
DecodePointer
GetCommandLineW
HeapSetInformation
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapCreate
HeapDestroy
Sleep
HeapSize
GetModuleHandleW
ExitProcess
EnterCriticalSection
LeaveCriticalSection
CloseHandle
WriteFile
GetStdHandle
GetModuleFileNameW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
InterlockedDecrement
GetCurrentThread
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapReAlloc
FatalAppExitA
SetConsoleCtrlHandler
FreeLibrary
InterlockedExchange
GetLocaleInfoW
RtlUnwind
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
SetStdHandle
GetConsoleCP
GetConsoleMode
LCMapStringW
MultiByteToWideChar
GetStringTypeW
SetFilePointer
IsProcessorFeaturePresent
WriteConsoleW
CreateFileW
GetUserDefaultLCID
RaiseException
user32
DestroyIcon
advapi32
ReadEventLogA
GetServiceKeyNameA
Sections
.text Size: 219KB - Virtual size: 218KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.maxejar Size: 512B - Virtual size: 124B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.hixuk Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 99KB - Virtual size: 98KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ