Static task
static1
Behavioral task
behavioral1
Sample
79a4c04639a0a9983467370b38de262641da79ccd51a0cdcd53aba20158f1b3a (1).exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
79a4c04639a0a9983467370b38de262641da79ccd51a0cdcd53aba20158f1b3a (1).exe
Resource
win10v2004-20240319-en
General
-
Target
79a4c04639a0a9983467370b38de262641da79ccd51a0cdcd53aba20158f1b3a (1)
-
Size
1.5MB
-
MD5
9b8ecdecbe7ac4bbf4568817f6f1fc39
-
SHA1
d41567a74542711ccca62d5435046be6f3110d4c
-
SHA256
79a4c04639a0a9983467370b38de262641da79ccd51a0cdcd53aba20158f1b3a
-
SHA512
828d8c3fe9e246d2905d06a0b1a8bd6fa259fe2412511a82eb40e2ebc20b91033c0049a830dc74bb4cfc60ecd5030ce9df540daa24f1c63af554490c8cae5ab2
-
SSDEEP
24576:tkvbQk+DgkJntzJ6ftUpd3V073hRzo8zqXUyInFXJGiwo:tkvbQ7TJnzaUpxVExhoBQsif
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 79a4c04639a0a9983467370b38de262641da79ccd51a0cdcd53aba20158f1b3a (1)
Files
-
79a4c04639a0a9983467370b38de262641da79ccd51a0cdcd53aba20158f1b3a (1).exe windows:6 windows x64 arch:x64
f4859a59151de015f91366c6659dbe27
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
DecodePointer
HeapDestroy
GetProcAddress
DeleteCriticalSection
GetProcessHeap
GetModuleHandleW
IsDebuggerPresent
CheckRemoteDebuggerPresent
CreateFileA
DeleteFileA
GetFileSize
MoveFileW
MultiByteToWideChar
SizeofResource
WriteFile
CreateFileW
GetLocaleInfoA
LockResource
GlobalAlloc
GlobalFree
GetSystemInfo
FindResourceExW
LoadResource
HeapAlloc
SetFileAttributesA
GetLogicalDriveStringsA
GlobalLock
VerSetConditionMask
GetComputerNameW
SystemTimeToFileTime
GlobalMemoryStatusEx
VerifyVersionInfoW
GetDiskFreeSpaceExA
GetSystemTime
GlobalUnlock
CreateMutexA
Sleep
SetEndOfFile
WriteConsoleW
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
GetACP
IsValidCodePage
GetTimeZoneInformation
HeapSetInformation
CloseHandle
HeapReAlloc
GetLastError
CreateToolhelp32Snapshot
HeapSize
LeaveCriticalSection
InitializeCriticalSectionEx
TerminateProcess
GetCurrentProcess
EnterCriticalSection
HeapFree
FindResourceW
VirtualProtect
CreatePipe
ReadConsoleW
ReadFile
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
GetFileType
SetFilePointerEx
GetFileSizeEx
GetExitCodeProcess
WaitForSingleObject
GetCommandLineW
GetCommandLineA
GetStdHandle
GetModuleFileNameW
MoveFileExW
DeleteFileW
RemoveDirectoryW
SetEnvironmentVariableW
ExitProcess
CreateProcessW
DuplicateHandle
GetModuleHandleExW
FreeLibraryAndExitThread
ExitThread
CreateThread
LoadLibraryExW
FreeLibrary
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
RtlPcToFileHeader
InterlockedPushEntrySList
RtlUnwindEx
RaiseException
OutputDebugStringW
SetLastError
QueryPerformanceCounter
QueryPerformanceFrequency
GetCurrentProcessId
GetCurrentThreadId
OpenThread
SuspendThread
ResumeThread
GetThreadContext
SetThreadContext
FlushInstructionCache
Thread32First
Thread32Next
VirtualAlloc
VirtualFree
VirtualQuery
WaitForSingleObjectEx
GetExitCodeThread
LocalFree
FormatMessageA
GetLocaleInfoEx
CreateDirectoryW
FindClose
FindFirstFileExW
FindNextFileW
GetFileAttributesExW
AreFileApisANSI
WideCharToMultiByte
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
TryAcquireSRWLockExclusive
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
WakeAllConditionVariable
SleepConditionVariableSRW
GetSystemTimeAsFileTime
EncodePointer
LCMapStringEx
GetStringTypeW
GetCPInfo
InitializeSListHead
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
GetStartupInfoW
RtlUnwind
user32
GetWindowRect
GetDC
OpenClipboard
GetDesktopWindow
EnumDisplayDevicesW
GetClipboardData
CloseClipboard
gdi32
BitBlt
CreateCompatibleBitmap
SelectObject
CreateDIBSection
SetDIBColorTable
CreateCompatibleDC
GetDIBits
GetObjectW
DeleteObject
DeleteDC
advapi32
GetUserNameW
GetCurrentHwProfileW
ole32
CoInitializeEx
CoUninitialize
CoTaskMemFree
CoCreateInstance
oleaut32
VariantInit
SysFreeString
SysStringLen
VariantClear
SysAllocString
shlwapi
PathFindExtensionW
gdiplus
GdipSaveImageToFile
GdiplusShutdown
GdipDrawImageI
GdipCreateBitmapFromScan0
GdipGetImageWidth
GdipGetImagePalette
GdipDeleteGraphics
GdipGetImageEncodersSize
GdipGetImageGraphicsContext
GdiplusStartup
GdipGetImageHeight
GdipGetImageEncoders
GdipGetImagePaletteSize
GdipCloneImage
GdipBitmapLockBits
GdipFree
GdipGetImagePixelFormat
GdipDisposeImage
GdipCreateBitmapFromHBITMAP
GdipAlloc
GdipBitmapUnlockBits
GdipCreateBitmapFromFile
urlmon
URLDownloadToFileA
wininet
InternetOpenA
InternetCloseHandle
HttpSendRequestA
InternetConnectA
InternetReadFile
HttpOpenRequestA
Sections
.text Size: 864KB - Virtual size: 863KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 187KB - Virtual size: 187KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 26KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 348B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 450KB - Virtual size: 449KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ