Static task
static1
Behavioral task
behavioral1
Sample
d97b7ed28237db88f0d6c819ae582d0691ce7bc28adb72953f6f0d5f466bb0fb.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
d97b7ed28237db88f0d6c819ae582d0691ce7bc28adb72953f6f0d5f466bb0fb.exe
Resource
win10-20231215-en
General
-
Target
d97b7ed28237db88f0d6c819ae582d0691ce7bc28adb72953f6f0d5f466bb0fb
-
Size
244KB
-
MD5
8a8eb1c8c76b8d7a3ede59f4570c2cd3
-
SHA1
de6fe286a874c39ea9ff310b68a37b42d7b05f5a
-
SHA256
d97b7ed28237db88f0d6c819ae582d0691ce7bc28adb72953f6f0d5f466bb0fb
-
SHA512
1b0aeba7d8b9b4eb547ec2ac1457529367fa98b5b0505a6a7d7977218c3392fa1743f9a042ceb5d1a80cbd6aae6649daa2d44a3811148d6b978d0e3e3c5a50ce
-
SSDEEP
3072:fxj7kLkYPbWbIC3R61PLhucoSO7LUGXqAOyMOIu+6I7aWJu5HVFUjWjJtp:fxj7MPqbRRyzY+O7NLJI+5HYjWj9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d97b7ed28237db88f0d6c819ae582d0691ce7bc28adb72953f6f0d5f466bb0fb
Files
-
d97b7ed28237db88f0d6c819ae582d0691ce7bc28adb72953f6f0d5f466bb0fb.exe windows:5 windows x86 arch:x86
4dcf0786e9c95a11a0ec45176eff4aa8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetLocaleInfoA
WriteConsoleOutputCharacterW
SystemTimeToTzSpecificLocalTime
SystemTimeToFileTime
OpenJobObjectA
GetComputerNameW
FreeEnvironmentStringsA
GetModuleHandleW
GetTickCount
GetConsoleAliasesA
WriteFile
LoadLibraryW
WriteConsoleOutputA
HeapDestroy
GetTimeZoneInformation
ReplaceFileA
FlushFileBuffers
CreateDirectoryA
SetCurrentDirectoryA
GetLastError
GetCurrentDirectoryW
GetProcAddress
CreateNamedPipeA
ResetEvent
LoadLibraryA
GetProcessWorkingSetSize
LocalAlloc
AddAtomW
VirtualProtect
EnumDateFormatsW
CompareStringA
FatalAppExitA
EnumSystemLocalesA
GetLocaleInfoA
GetCommandLineA
HeapSetInformation
GetStartupInfoW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
ExitProcess
DecodePointer
GetStdHandle
GetModuleFileNameW
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
GetCurrentThread
HeapCreate
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
LeaveCriticalSection
EnterCriticalSection
SetConsoleCtrlHandler
FreeLibrary
InterlockedExchange
GetLocaleInfoW
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapFree
Sleep
RtlUnwind
HeapSize
LCMapStringW
MultiByteToWideChar
GetStringTypeW
HeapReAlloc
IsProcessorFeaturePresent
RaiseException
GetUserDefaultLCID
IsValidLocale
user32
GetClassLongA
Sections
.text Size: 136KB - Virtual size: 136KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 39.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.jisiy Size: 512B - Virtual size: 124B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tomik Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.dibajo Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 82KB - Virtual size: 81KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ