Static task
static1
Behavioral task
behavioral1
Sample
108ad651eac4adca4da9716dddc31ca092a46da5e0a11e760fad04c6d893f046.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
108ad651eac4adca4da9716dddc31ca092a46da5e0a11e760fad04c6d893f046.exe
Resource
win10v2004-20240226-en
General
-
Target
108ad651eac4adca4da9716dddc31ca092a46da5e0a11e760fad04c6d893f046
-
Size
280KB
-
MD5
2bda11b455ff870c31321969cfaf507c
-
SHA1
472e0d1a6b4be4aa01c8c9be72c928a162c879e9
-
SHA256
108ad651eac4adca4da9716dddc31ca092a46da5e0a11e760fad04c6d893f046
-
SHA512
143f90fe9f3928276e4735d42e61cd9936f825c82301ed18d2b722a5bc5b7e56756db01b17a60b99a1067dfbba6ed87f659e86bde0b696e0b887c915e5e23645
-
SSDEEP
3072:E/TUcUPYpnCgIvQCbDhYGYDoQUdSMBeePnoY46bBRJc5018EVddCOuGx3uJxJ3:ETqYNCgI4C/h1YDNdaohMcW5d3u+up
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 108ad651eac4adca4da9716dddc31ca092a46da5e0a11e760fad04c6d893f046
Files
-
108ad651eac4adca4da9716dddc31ca092a46da5e0a11e760fad04c6d893f046.exe windows:6 windows x64 arch:x64
51c3976a0f6d05144b1d7016d07dc0d0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
dwmapi
DwmSetWindowAttribute
user32
FindWindowA
GetWindowThreadProcessId
GetMessageA
SetPropA
PostMessageW
DispatchMessageA
LoadCursorA
CreateWindowExW
RegisterClassExW
IsWindow
TranslateAcceleratorA
SetTimer
SetWindowsHookExA
LoadAcceleratorsA
UnhookWindowsHookEx
DefWindowProcA
ChangeWindowMessageFilter
TranslateMessage
FindWindowW
PostQuitMessage
RegisterWindowMessageW
kernel32
FlsSetValue
WriteConsoleW
CreateFileW
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
HeapSize
SetFilePointerEx
HeapReAlloc
SetStdHandle
GetProcessHeap
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
GetCurrentProcess
WaitForSingleObject
OpenProcess
CloseHandle
LoadLibraryW
K32EnumProcesses
SetCurrentDirectoryW
GetProcAddress
FreeLibrary
QueryFullProcessImageNameW
FindNextFileW
FindFirstFileExW
FindClose
GetFileType
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
MultiByteToWideChar
GetStringTypeW
WideCharToMultiByte
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
EncodePointer
DecodePointer
FlsAlloc
FlsGetValue
FlsFree
GetCPInfo
RtlUnwindEx
RtlPcToFileHeader
RaiseException
GetLastError
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
CreateThread
ExitThread
FreeLibraryAndExitThread
GetModuleHandleExW
ExitProcess
GetModuleFileNameW
GetStdHandle
WriteFile
HeapAlloc
HeapFree
LCMapStringW
shlwapi
PathRemoveFileSpecW
PathRemoveBackslashW
Sections
.text Size: 84KB - Virtual size: 84KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 348B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 100KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ