Static task
static1
Behavioral task
behavioral1
Sample
03795a683bf3eb9ed7673522fe7eac45949a824da8043236cd504fd8106e3593.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
03795a683bf3eb9ed7673522fe7eac45949a824da8043236cd504fd8106e3593.exe
Resource
win10v2004-20231215-en
General
-
Target
03795a683bf3eb9ed7673522fe7eac45949a824da8043236cd504fd8106e3593
-
Size
6.1MB
-
MD5
f5daa93b81be67cfd79a403d5a8a7ed8
-
SHA1
9a218d3e65b974ab1bc9fa364a5597df0beddb72
-
SHA256
03795a683bf3eb9ed7673522fe7eac45949a824da8043236cd504fd8106e3593
-
SHA512
b223db7541c4c5733d6da1e185042e910cda0b3503f046c9f343bd9ecdff3a7162c2a3abd6038013ac857ca875f03f0516f5e6439311f1c7aa5008db5c5397fd
-
SSDEEP
196608:7D1K5W5Zj7xEcF/zMV5C/Gb9bcxcHFhpHn:75KU55xEErMVQ/sbcux
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 03795a683bf3eb9ed7673522fe7eac45949a824da8043236cd504fd8106e3593
Files
-
03795a683bf3eb9ed7673522fe7eac45949a824da8043236cd504fd8106e3593.exe windows:4 windows x86 arch:x86
c1a18b77b8727a1efe13c5fef57c34b1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
CryptAcquireContextW
CryptDecrypt
CryptDestroyKey
CryptImportKey
CryptReleaseContext
CryptSetKeyParam
comctl32
InitCommonControls
crypt32
CryptStringToBinaryA
kernel32
CloseHandle
ConnectNamedPipe
CreateEventW
CreateFileW
CreateNamedPipeW
CreateThread
DeleteCriticalSection
EnterCriticalSection
FreeLibrary
GetEnvironmentVariableW
GetLastError
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleW
GetProcAddress
GetStartupInfoW
HeapAlloc
HeapCreate
HeapDestroy
HeapFree
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryA
LocalAlloc
LocalFree
QueryPerformanceCounter
QueryPerformanceFrequency
ReadFile
SetUnhandledExceptionFilter
Sleep
TlsGetValue
VirtualProtect
VirtualQuery
WaitForSingleObject
WriteFile
lstrlenA
msvcrt
__lconv_init
__p__commode
__p__fmode
__p__wcmdln
__set_app_type
__setusermatherr
__wgetmainargs
__winitenv
_amsg_exit
_cexit
_initterm
_iob
_onexit
_rotr
abort
calloc
exit
fprintf
free
fwrite
malloc
memcpy
signal
strlen
strncmp
vfprintf
wcsrchr
ntdll
EtwpCreateEtwThread
NtQueryInformationProcess
RtlFreeUnicodeString
RtlStringFromGUID
rpcrt4
UuidCreate
user32
DialogBoxParamW
wsprintfW
Sections
.text Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 44B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 5.9MB - Virtual size: 5.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.eh_fram Size: 1024B - Virtual size: 600B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 800B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 52B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 162KB - Virtual size: 161KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE