Static task
static1
Behavioral task
behavioral1
Sample
0996a8e5ec1a41645309e2ca395d3a6b766a7c52784c974c776f258c1b25a76c.exe
Resource
win10v2004-20231215-en
General
-
Target
0996a8e5ec1a41645309e2ca395d3a6b766a7c52784c974c776f258c1b25a76c.exe.old
-
Size
268KB
-
MD5
f4d46629ca15313b94992f3798718df7
-
SHA1
98d6417addec8607f1b62cc52123be76424befc0
-
SHA256
0996a8e5ec1a41645309e2ca395d3a6b766a7c52784c974c776f258c1b25a76c
-
SHA512
6c86fb0b8e6a99ffd33cc8dd749fab5320942ab3709bdf9313fc9aceecaa055a8c69593ec43cb1608f7d2f30473192024ee49fc9ce91dec19c6cad504a28f381
-
SSDEEP
6144:w33Tn+SJX6hDGRPJNJyPhkK1228jVdXRHZPJwQC8O:w36qRbJyZH1228j/TPu0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0996a8e5ec1a41645309e2ca395d3a6b766a7c52784c974c776f258c1b25a76c.exe.old
Files
-
0996a8e5ec1a41645309e2ca395d3a6b766a7c52784c974c776f258c1b25a76c.exe.old.exe windows:6 windows x64 arch:x64
0e15d4b92e4de8ce71e3c186bb853030
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
CloseHandle
GetTickCount
Sleep
CreateProcessA
VirtualFree
LoadResource
SizeofResource
VirtualAlloc
LockResource
CreateFileA
GetFileSize
FindResourceExW
FindResourceW
WriteFile
WideCharToMultiByte
ReadFile
GetModuleFileNameA
GetProcAddress
LoadLibraryA
GetLogicalDrives
GetSystemTimeAsFileTime
GetLocalTime
LocalFileTimeToFileTime
GetModuleHandleA
WriteConsoleW
SetFilePointerEx
FlushFileBuffers
SetStdHandle
GetConsoleMode
GetConsoleCP
GetStringTypeW
LCMapStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCurrentProcessId
QueryPerformanceCounter
GetFileType
GetCurrentThreadId
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
LoadLibraryExW
GetModuleFileNameW
GetStdHandle
GetModuleHandleW
GetStartupInfoW
DeleteCriticalSection
DecodePointer
HeapSize
GetLastError
RaiseException
InitializeCriticalSectionEx
HeapDestroy
GetProcessHeap
HeapFree
HeapAlloc
CreateFileW
HeapReAlloc
IsDebuggerPresent
OutputDebugStringW
EnterCriticalSection
LeaveCriticalSection
EncodePointer
ExitProcess
GetModuleHandleExW
MultiByteToWideChar
GetCommandLineA
RtlPcToFileHeader
RtlLookupFunctionEntry
RtlUnwindEx
IsProcessorFeaturePresent
RtlCaptureContext
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
InitializeCriticalSectionAndSpinCount
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
user32
GetClassNameA
GetWindowRect
GetWindowTextA
GetCursorPos
GetSysColorBrush
GetCursor
LoadImageA
LoadCursorA
ChangeDisplaySettingsA
GetWindow
LoadCursorFromFileA
DispatchMessageA
GetRawInputDeviceList
gdi32
GetFontLanguageInfo
CreateBitmap
GetFontUnicodeRanges
Sections
.text Size: 62KB - Virtual size: 62KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 45KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.KDATA Size: 146KB - Virtual size: 146KB