Static task
static1
Behavioral task
behavioral1
Sample
9dc6cdf8c06fe5f036b104fcb36b6caf81ca62cef587680d3a16f8d1cfe9086e.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
9dc6cdf8c06fe5f036b104fcb36b6caf81ca62cef587680d3a16f8d1cfe9086e.exe
Resource
win10-20240221-en
General
-
Target
9dc6cdf8c06fe5f036b104fcb36b6caf81ca62cef587680d3a16f8d1cfe9086e
-
Size
312KB
-
MD5
bb1bc9ff909263205ad9e956fe545042
-
SHA1
a71cf2c3a896810fcc276ed00f78c19ee6aab148
-
SHA256
9dc6cdf8c06fe5f036b104fcb36b6caf81ca62cef587680d3a16f8d1cfe9086e
-
SHA512
1bbfd82113f925dbd98d615b6940eb0f2e3fb192c66c662e8e7f1c5d2c8887c63f31f37987915b206cf22ea0d7a4dbdf14aca91f297153e74d2284843602c297
-
SSDEEP
3072:Kpv1aQz0ZhthyNy+jlx5lXJjaJva1rto9xtrjLkNt/IBeiOlFRR:KDBzBEobJ2pa5to9/DkP/sexv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 9dc6cdf8c06fe5f036b104fcb36b6caf81ca62cef587680d3a16f8d1cfe9086e
Files
-
9dc6cdf8c06fe5f036b104fcb36b6caf81ca62cef587680d3a16f8d1cfe9086e.exe windows:5 windows x86 arch:x86
48a41026330940883e631637d6182ed1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReadConsoleA
GetConsoleAliasA
CreateDirectoryW
GetFileAttributesExA
GetTickCount
GetCommConfig
EnumTimeFormatsW
GlobalAlloc
GlobalFindAtomA
LoadLibraryW
FreeConsole
GetConsoleAliasExesLengthW
EnumSystemCodePagesA
WriteConsoleW
CreateFileW
MultiByteToWideChar
FindNextVolumeMountPointW
GetLastError
GetProcAddress
PeekConsoleInputW
GetExitCodeThread
GetNumberFormatW
RemoveDirectoryW
QueryDosDeviceW
OpenJobObjectA
GetModuleFileNameA
GetModuleHandleA
VirtualProtect
GetCurrentDirectoryA
GetVersionExA
GetWindowsDirectoryW
GetCurrentProcessId
ReadConsoleOutputCharacterW
GetVolumeInformationW
CloseHandle
SetStdHandle
OutputDebugStringW
LoadLibraryExW
SetFilePointerEx
HeapReAlloc
GetOEMCP
IsValidCodePage
GetACP
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetSystemTimeAsFileTime
InterlockedIncrement
FindResourceA
GetLocaleInfoA
FoldStringW
GetEnvironmentVariableW
QueryPerformanceCounter
GetCurrentThreadId
EncodePointer
DecodePointer
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
WideCharToMultiByte
GetStringTypeW
HeapFree
HeapAlloc
GetCommandLineA
RaiseException
RtlUnwind
GetCPInfo
IsProcessorFeaturePresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
InitializeCriticalSectionAndSpinCount
Sleep
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
LCMapStringW
GetProcessHeap
IsDebuggerPresent
GetStdHandle
GetFileType
ExitProcess
GetModuleHandleExW
WriteFile
GetModuleFileNameW
FlushFileBuffers
GetConsoleCP
GetConsoleMode
HeapSize
user32
GetKeyboardLayoutNameA
CharUpperBuffW
GetKeyNameTextA
ChangeDisplaySettingsW
ChangeMenuA
GetWindowTextLengthA
DrawEdge
GetClassInfoW
CreateWindowStationA
CharLowerA
SetUserObjectSecurity
GetAltTabInfoW
DdeQueryStringA
CloseWindow
gdi32
CreateCompatibleBitmap
CreateDCA
advapi32
ReadEventLogA
winhttp
WinHttpOpen
Sections
.text Size: 60KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 34KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 148KB - Virtual size: 41.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ