Static task
static1
Behavioral task
behavioral1
Sample
12a7b9fa57719109b7f5d081cbe032320a59a7d57eef2dcd2cd4fe2b909162dc.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
12a7b9fa57719109b7f5d081cbe032320a59a7d57eef2dcd2cd4fe2b909162dc.exe
Resource
win10v2004-20231215-en
General
-
Target
12a7b9fa57719109b7f5d081cbe032320a59a7d57eef2dcd2cd4fe2b909162dc
-
Size
147KB
-
MD5
910ea9f6b7f6d06fc42d448b143a3634
-
SHA1
2d2dc7316ba5b9de546d175c620d2ccda72fab5a
-
SHA256
12a7b9fa57719109b7f5d081cbe032320a59a7d57eef2dcd2cd4fe2b909162dc
-
SHA512
7b654e2c32e5bfa10e7501364827ff76c002c2d54a30a19fd07c1d9a20d0adf3963e7b7b9e39e6c7f6e967ed182df3b3699821c79631d87c39f33497fb49971b
-
SSDEEP
3072:KH/7F/x4Dt7/r6aHK3PqkqCTBfgXyaWnJQIfH:8jF/x4B/6aq3CkqCTBIXtIf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 12a7b9fa57719109b7f5d081cbe032320a59a7d57eef2dcd2cd4fe2b909162dc
Files
-
12a7b9fa57719109b7f5d081cbe032320a59a7d57eef2dcd2cd4fe2b909162dc.exe windows:5 windows x86 arch:x86
40e764bc240da4324b80f9df6409f482
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InitializeCriticalSection
CreateFileW
CloseHandle
DeleteCriticalSection
GetVolumeInformationW
FindFirstFileExW
FindNextFileW
GetModuleFileNameW
FindClose
MultiByteToWideChar
Sleep
LoadLibraryW
GetProcAddress
GetModuleHandleW
FreeLibrary
WideCharToMultiByte
WaitForSingleObject
CreateEventW
SetEvent
LeaveCriticalSection
CreateThread
VirtualProtect
VirtualFree
VirtualAlloc
GetModuleHandleA
LoadLibraryA
CreateMutexW
GetLastError
DecodePointer
WriteConsoleW
SetFilePointerEx
GetConsoleCP
FlushFileBuffers
GetConsoleMode
HeapReAlloc
HeapSize
SetStdHandle
WriteFile
EnterCriticalSection
GetProcessHeap
HeapAlloc
HeapFree
ResetEvent
LCMapStringW
GetTickCount
FreeEnvironmentStringsW
GetEnvironmentStringsW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetSystemTime
GetLocalTime
GetComputerNameW
EncodePointer
RaiseException
SetLastError
RtlUnwind
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
GetStdHandle
ExitProcess
GetModuleHandleExW
GetACP
GetStringTypeW
GetFileType
IsValidCodePage
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
user32
TranslateMessage
LoadCursorW
PostQuitMessage
UpdateWindow
CreateWindowExW
GetMessageW
DefWindowProcW
SetWindowPos
TranslateAcceleratorW
RegisterClassExW
LoadAcceleratorsW
ShowWindow
DispatchMessageW
wsprintfW
advapi32
GetUserNameW
shell32
SHGetFolderPathA
ws2_32
inet_ntoa
WSAStartup
WSACleanup
gethostname
gethostbyname
Sections
.text Size: 96KB - Virtual size: 96KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 41KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 284B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ