Static task
static1
Behavioral task
behavioral1
Sample
30bc317abd2e1d88cfd57d59bcbeba370a52a19dae7abaa60313204ed08984dd.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
30bc317abd2e1d88cfd57d59bcbeba370a52a19dae7abaa60313204ed08984dd.exe
Resource
win10v2004-20240319-en
General
-
Target
30bc317abd2e1d88cfd57d59bcbeba370a52a19dae7abaa60313204ed08984dd
-
Size
305KB
-
MD5
4cd7bd5eb42f178955565815376b4675
-
SHA1
ad4290f9aeef9c8a730712a00918dcab76accad6
-
SHA256
30bc317abd2e1d88cfd57d59bcbeba370a52a19dae7abaa60313204ed08984dd
-
SHA512
bb4b30fd84d125027fa4f2f692b830cb96ad18948789387d29b0d60ec3a7d4cd48d581fe793404410274c4eb76a65b16be74bc82ea4bd4a1ce7ddcd37b60b785
-
SSDEEP
3072:OBw4siyVXC+z/7+EX4NxdsIP+vmVAPznIRjWg1QmgVbjhIjnAG:l5CK8F+vmWPDOjd2mgVbjabJ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 30bc317abd2e1d88cfd57d59bcbeba370a52a19dae7abaa60313204ed08984dd
Files
-
30bc317abd2e1d88cfd57d59bcbeba370a52a19dae7abaa60313204ed08984dd.exe windows:5 windows x86 arch:x86
6911fddb233fa8e4e7d5798f64fd8e58
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLocaleInfoA
InterlockedDecrement
QueryDosDeviceA
GetTickCount
FindNextVolumeMountPointA
ReadConsoleW
GetWindowsDirectoryA
EnumTimeFormatsA
GlobalAlloc
WideCharToMultiByte
GetVolumeInformationA
GlobalFindAtomA
GetLocaleInfoW
GetSystemPowerStatus
GetConsoleAliasExesLengthW
GetVersionExW
GetConsoleAliasW
WriteConsoleW
GetEnvironmentVariableA
FindResourceA
GetLastError
GetCurrentDirectoryW
ReadConsoleOutputCharacterA
GetProcAddress
LoadLibraryA
SetConsoleCtrlHandler
GetNumberFormatW
RemoveDirectoryW
GetModuleFileNameA
GetModuleHandleA
VirtualProtect
PeekConsoleInputA
GetCurrentProcessId
CloseHandle
CreateFileW
SetStdHandle
OutputDebugStringW
LoadLibraryExW
ExitThread
CreateFileA
EncodePointer
DecodePointer
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
MultiByteToWideChar
GetStringTypeW
HeapFree
HeapAlloc
IsProcessorFeaturePresent
GetCommandLineA
RaiseException
RtlUnwind
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
InitializeCriticalSectionAndSpinCount
Sleep
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
LCMapStringW
GetProcessHeap
ExitProcess
GetModuleHandleExW
GetStdHandle
WriteFile
GetModuleFileNameW
FlushFileBuffers
GetConsoleCP
GetConsoleMode
HeapSize
IsDebuggerPresent
GetCurrentThreadId
GetFileType
ReadFile
SetFilePointerEx
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetACP
IsValidCodePage
GetOEMCP
HeapReAlloc
user32
CharLowerA
GetAltTabInfoA
SetUserObjectSecurity
GetClassInfoA
DrawFrameControl
CharUpperBuffW
advapi32
ReadEventLogA
Sections
.text Size: 62KB - Virtual size: 62KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 34KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 149KB - Virtual size: 41.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 58KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ