Static task
static1
Behavioral task
behavioral1
Sample
425ee82f20eb87e07a0d4f77adb72bf3377051365be203ee6ded37b399094f20.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
425ee82f20eb87e07a0d4f77adb72bf3377051365be203ee6ded37b399094f20.exe
Resource
win10v2004-20240226-en
General
-
Target
425ee82f20eb87e07a0d4f77adb72bf3377051365be203ee6ded37b399094f20
-
Size
141KB
-
MD5
81f28082110684818ba63f86522af13a
-
SHA1
6decaaccd4359c2102b861a755d20a56ec0fdf27
-
SHA256
425ee82f20eb87e07a0d4f77adb72bf3377051365be203ee6ded37b399094f20
-
SHA512
2a8b88a0e579c88ee8a914290c9330543f739dec74a6d59271782d140d59d922b8b142635a1b48bc42055fb341be22a2d28b83d6633644370ca2346851baaa72
-
SSDEEP
3072:NUpzlmMffEv/6vDS/Q8yDl17id8lrywXRAdhEgeTc/Ix18LsiKddZ:GWgEHoH7y8lrrArEgOTwK7Z
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 425ee82f20eb87e07a0d4f77adb72bf3377051365be203ee6ded37b399094f20
Files
-
425ee82f20eb87e07a0d4f77adb72bf3377051365be203ee6ded37b399094f20.exe windows:6 windows x86 arch:x86
bf78420ea403f1c375416aab93582d42
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
GetUserNameA
GetCurrentHwProfileA
MapGenericMask
DuplicateToken
OpenProcessToken
AccessCheck
GetFileSecurityA
shell32
SHCreateDirectoryExW
shlwapi
PathAppendW
PathFindFileNameA
PathFindFileNameW
ws2_32
WSAStartup
inet_ntoa
freeaddrinfo
WSACleanup
getaddrinfo
crypt32
CryptBinaryToStringA
wininet
InternetGetConnectedState
InternetConnectA
InternetReadFile
InternetCloseHandle
InternetOpenA
HttpAddRequestHeadersA
InternetSetOptionA
HttpOpenRequestA
InternetQueryDataAvailable
HttpSendRequestA
ole32
CoInitializeSecurity
CoInitializeEx
CoUninitialize
CoCreateInstance
oleaut32
VariantInit
SysFreeString
SysAllocString
VariantClear
kernel32
DecodePointer
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
HeapReAlloc
HeapSize
SetFilePointerEx
CreateFileW
GetProcessHeap
GetStringTypeW
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
GetTimeZoneInformation
LCMapStringW
CompareStringW
GetFileType
HeapAlloc
HeapFree
Sleep
LoadLibraryA
GetVolumeInformationA
GetWindowsDirectoryA
GetComputerNameA
GetModuleFileNameA
MoveFileA
FindFirstFileW
FindNextFileW
TerminateProcess
GetModuleFileNameW
FindClose
OpenProcess
CreateToolhelp32Snapshot
Process32NextW
DeleteFileA
DeleteFileW
Process32FirstW
CloseHandle
CopyFileW
QueryFullProcessImageNameW
GetCurrentProcess
WriteFile
MultiByteToWideChar
GetLastError
CreateFileA
WideCharToMultiByte
CreateProcessA
LocalFree
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
GetCommandLineW
RtlUnwind
RaiseException
SetLastError
EncodePointer
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
ExitProcess
GetModuleHandleExW
GetStdHandle
GetCommandLineA
WriteConsoleW
Sections
.text Size: 98KB - Virtual size: 98KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 30KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ