Static task
static1
Behavioral task
behavioral1
Sample
ef9b39705decbb85269518705053e7f4087758eea6bab4ba9135bf1ae922b2ea.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ef9b39705decbb85269518705053e7f4087758eea6bab4ba9135bf1ae922b2ea.exe
Resource
win10v2004-20231215-en
General
-
Target
ef9b39705decbb85269518705053e7f4087758eea6bab4ba9135bf1ae922b2ea
-
Size
144KB
-
MD5
65365420a3bb5d943ecd6668dd5dbfef
-
SHA1
ecec3a41717f2139fea8963927a97eea3201a3e0
-
SHA256
ef9b39705decbb85269518705053e7f4087758eea6bab4ba9135bf1ae922b2ea
-
SHA512
c39321c4194ae1ae3ae0aba49b067600e5050c3b167124279e8776a6118fededa7480f9ea536c5405482bd2496746b65749c9773939f353db6188c0e6814ecb9
-
SSDEEP
3072:+tCYQH0vZ/9l4s+vDalOqG6BYGOIVwXT2WnGJOtYxwGpNlgFZY:0CwxHRXOqVIIC2nSK+ZY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ef9b39705decbb85269518705053e7f4087758eea6bab4ba9135bf1ae922b2ea
Files
-
ef9b39705decbb85269518705053e7f4087758eea6bab4ba9135bf1ae922b2ea.exe windows:6 windows x86 arch:x86
18f7be873ea0c8c15264c3aede79d058
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
GetUserNameA
GetCurrentHwProfileA
MapGenericMask
DuplicateToken
OpenProcessToken
AccessCheck
GetFileSecurityA
shlwapi
PathAppendW
PathFindFileNameA
PathFindFileNameW
shell32
SHCreateDirectoryExW
ole32
CoInitializeSecurity
CoCreateInstance
CoUninitialize
CoInitializeEx
oleaut32
VariantInit
SysFreeString
SysAllocString
VariantClear
kernel32
CreateFileW
DecodePointer
GetConsoleMode
GetConsoleCP
FlushFileBuffers
HeapReAlloc
HeapSize
SetFilePointerEx
GetProcessHeap
GetStringTypeW
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCPInfo
GetOEMCP
Sleep
LoadLibraryA
GetVolumeInformationA
GetWindowsDirectoryA
GetComputerNameA
GetModuleFileNameA
MoveFileA
FindFirstFileW
FindNextFileW
TerminateProcess
GetModuleFileNameW
FindClose
OpenProcess
CreateToolhelp32Snapshot
Process32NextW
DeleteFileA
DeleteFileW
Process32FirstW
CloseHandle
CopyFileW
QueryFullProcessImageNameW
VirtualFree
GetCurrentProcess
WriteFile
VirtualAlloc
MultiByteToWideChar
GetLastError
CreateFileA
WideCharToMultiByte
CreateProcessA
LocalFree
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
GetACP
RtlUnwind
RaiseException
SetLastError
EncodePointer
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
ExitProcess
GetModuleHandleExW
GetStdHandle
GetCommandLineA
GetCommandLineW
HeapFree
HeapAlloc
GetFileType
CompareStringW
LCMapStringW
GetTimeZoneInformation
FindFirstFileExW
IsValidCodePage
WriteConsoleW
Sections
.text Size: 102KB - Virtual size: 101KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ