Static task
static1
Behavioral task
behavioral1
Sample
4cca68fe0b95cfb217d3c687c4e693de691b5da423cb3c23ba7ff455c74fe935.exe
Resource
win7-20240221-en
General
-
Target
4cca68fe0b95cfb217d3c687c4e693de691b5da423cb3c23ba7ff455c74fe935
-
Size
312KB
-
MD5
1810fe54c876d6f48023f5d4dd7e1549
-
SHA1
e972b56a82be7c18bfc979aadc0e0358b850da8c
-
SHA256
4cca68fe0b95cfb217d3c687c4e693de691b5da423cb3c23ba7ff455c74fe935
-
SHA512
69cb48b343951861a7fc018f33ceda19a5147fa93e99ea42335a73c4cb5886d32fd4bf829bbd72230b907a58e2e274cdaf78007f344bfb20a46769bd32ff40ef
-
SSDEEP
3072:gX1HPDx94Bh8vTsSC1o2GmPje8y06aE9n3yc75m0A+gjsxP8TaCwPZD/jqgnyCNC:SrEBY61/Gmblm393yz+xP8U9y195aW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4cca68fe0b95cfb217d3c687c4e693de691b5da423cb3c23ba7ff455c74fe935
Files
-
4cca68fe0b95cfb217d3c687c4e693de691b5da423cb3c23ba7ff455c74fe935.exe windows:5 windows x86 arch:x86
262ebebc1125c68c79c87bc329257c28
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CopyFileExW
GetModuleHandleExA
SetLocalTime
BuildCommDCBAndTimeoutsA
CallNamedPipeA
SetUnhandledExceptionFilter
WaitNamedPipeA
GlobalSize
GetEnvironmentStringsW
InterlockedCompareExchange
WriteConsoleInputA
SetEvent
BackupSeek
GetModuleHandleW
CreateRemoteThread
SetFileTime
GetWindowsDirectoryA
GetDateFormatA
FindActCtxSectionStringA
GetDriveTypeA
GlobalAlloc
ReadFileScatter
GetVersionExW
DnsHostnameToComputerNameW
GetComputerNameExA
FindNextVolumeW
GetConsoleAliasW
GetFileAttributesW
EnumCalendarInfoA
GetSystemDirectoryA
FindNextVolumeMountPointW
DeactivateActCtx
EnumSystemLocalesA
GetConsoleOutputCP
OpenMutexW
GetProcAddress
LoadLibraryA
LocalAlloc
SetCalendarInfoW
RemoveDirectoryW
GlobalGetAtomNameW
GetCommMask
RtlCaptureStackBackTrace
GlobalFindAtomW
EnumResourceTypesW
FindNextFileA
GetModuleHandleA
SetLocaleInfoW
EraseTape
CreateMutexA
GetStringTypeW
RequestWakeupLatency
GetVolumeNameForVolumeMountPointW
DeleteFileW
GetFileInformationByHandle
CloseHandle
HeapSize
GetModuleFileNameW
lstrcmpA
GetLastError
WideCharToMultiByte
DeleteFileA
HeapReAlloc
GetCommandLineA
HeapSetInformation
GetStartupInfoW
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
DecodePointer
TlsFree
SetLastError
GetCurrentThreadId
GetCurrentThread
UnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
EnterCriticalSection
LeaveCriticalSection
HeapCreate
HeapDestroy
HeapFree
HeapAlloc
SetFilePointer
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LCMapStringW
MultiByteToWideChar
FatalAppExitA
Sleep
IsProcessorFeaturePresent
GetLocaleInfoW
GetUserDefaultLCID
GetLocaleInfoA
IsValidLocale
RtlUnwind
SetStdHandle
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetConsoleCtrlHandler
FreeLibrary
InterlockedExchange
LoadLibraryW
WriteConsoleW
CreateFileW
user32
GetMenu
advapi32
ReportEventA
Sections
.text Size: 109KB - Virtual size: 109KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 140KB - Virtual size: 3.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 61KB - Virtual size: 61KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ