Static task
static1
Behavioral task
behavioral1
Sample
b273cb8fad5fa08ce136059b0fb5ea9acfd42ec2fe43a5d015cc1d1861a9e2ca.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
b273cb8fad5fa08ce136059b0fb5ea9acfd42ec2fe43a5d015cc1d1861a9e2ca.exe
Resource
win10-20240214-en
General
-
Target
b273cb8fad5fa08ce136059b0fb5ea9acfd42ec2fe43a5d015cc1d1861a9e2ca
-
Size
815KB
-
MD5
7bf20d590631be9b23676b29c206c83d
-
SHA1
cc762d897dc08e3725bf3973fe03995801867a57
-
SHA256
b273cb8fad5fa08ce136059b0fb5ea9acfd42ec2fe43a5d015cc1d1861a9e2ca
-
SHA512
6205796bc0f8a36072e0f38192959ad1f02d27273e31ae0e4c6500bf137e12c9213b9f52288ca45ca93cd2d61470c17e4d52bcf54d8b29d43ee78fd05629f9e2
-
SSDEEP
24576:oC4+m6l9eoc0Mnkz12do394OlKlFogR0:oC4+9wN06geo3mb7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b273cb8fad5fa08ce136059b0fb5ea9acfd42ec2fe43a5d015cc1d1861a9e2ca
Files
-
b273cb8fad5fa08ce136059b0fb5ea9acfd42ec2fe43a5d015cc1d1861a9e2ca.exe windows:5 windows x86 arch:x86
06795e7a4243010ba1cddcdd6acb03bf
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SystemTimeToTzSpecificLocalTime
HeapAlloc
SystemTimeToFileTime
CreateDirectoryW
SetEvent
FreeEnvironmentStringsA
GetTickCount
GetConsoleAliasesA
GetConsoleAliasesLengthA
LoadLibraryW
AssignProcessToJobObject
ReplaceFileW
FlushFileBuffers
GetCurrentDirectoryW
WriteConsoleOutputCharacterA
lstrcmpiA
GetProcAddress
CreateNamedPipeA
LoadLibraryA
LocalAlloc
SetProcessWorkingSetSize
AddAtomA
EnumDateFormatsA
EraseTape
VirtualProtect
CompareStringA
FatalAppExitA
IsValidLocale
EnumSystemLocalesA
SetLastError
GetComputerNameA
GetLocaleInfoA
GetUserDefaultLCID
GetModuleHandleW
ExitProcess
DecodePointer
GetCommandLineA
HeapSetInformation
GetStartupInfoW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
WriteFile
GetStdHandle
GetModuleFileNameW
HeapCreate
HeapDestroy
EncodePointer
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetLastError
SetConsoleCtrlHandler
FreeLibrary
InterlockedExchange
GetLocaleInfoW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
GetCurrentThread
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapFree
Sleep
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapSize
RtlUnwind
HeapReAlloc
IsProcessorFeaturePresent
LCMapStringW
MultiByteToWideChar
GetStringTypeW
GetConsoleCP
GetConsoleMode
SetFilePointer
CloseHandle
WriteConsoleW
SetStdHandle
CreateFileW
RaiseException
user32
GetClassLongW
advapi32
AccessCheckByType
ole32
CreateDataCache
Sections
.text Size: 685KB - Virtual size: 684KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 39.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.zusoc Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 104KB - Virtual size: 103KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ