Static task
static1
Behavioral task
behavioral1
Sample
69cfef2e0a767b6ed50194f288b0d1f6bd4e825b23adb037e4c2e3695fac5a62.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
69cfef2e0a767b6ed50194f288b0d1f6bd4e825b23adb037e4c2e3695fac5a62.exe
Resource
win10-20240404-en
General
-
Target
69cfef2e0a767b6ed50194f288b0d1f6bd4e825b23adb037e4c2e3695fac5a62
-
Size
296KB
-
MD5
465f7777fd70fc0cd9325550a1786cd3
-
SHA1
03e305fb6ca5ee3082b84e5e013a61f6dc057e1e
-
SHA256
69cfef2e0a767b6ed50194f288b0d1f6bd4e825b23adb037e4c2e3695fac5a62
-
SHA512
6a20ee2d496441a48aa6249ccb5b50ac5146d8d9a3ec50a5a4c827205048be0194254dd8e28f6c1201310ec3c0c75103f4f5a5b801b62920680bd43b68b36ba5
-
SSDEEP
3072:tE3lMHLSW0Dwkp5bHYp6Ebx9D9C5nG8tvO+IDt45+no5JFX4K1uIKF:4MHLOwgC6QDKrG910oou
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 69cfef2e0a767b6ed50194f288b0d1f6bd4e825b23adb037e4c2e3695fac5a62
Files
-
69cfef2e0a767b6ed50194f288b0d1f6bd4e825b23adb037e4c2e3695fac5a62.exe windows:5 windows x86 arch:x86
339ef553d0ba42cadf81511b2d79315b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapReAlloc
SetDefaultCommConfigA
TryEnterCriticalSection
GetConsoleAliasesLengthW
VirtualQuery
GetCommState
HeapFree
GetComputerNameW
UnlockFile
FreeEnvironmentStringsA
GetModuleHandleW
FindNextVolumeMountPointA
GetDateFormatA
EnumTimeFormatsW
GlobalAlloc
LoadLibraryW
GetLocaleInfoW
IsBadWritePtr
GetModuleFileNameW
SetConsoleTitleA
SetCurrentDirectoryA
GetCurrentDirectoryW
GetLongPathNameW
GetProcAddress
FindVolumeMountPointClose
GetProcessHeaps
GetAtomNameA
LoadLibraryA
SetCalendarInfoW
SetConsoleOutputCP
CreatePipe
BuildCommDCBA
VirtualProtect
HeapAlloc
GetLastError
Sleep
ExitProcess
GetStartupInfoW
RaiseException
RtlUnwind
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
VirtualFree
VirtualAlloc
HeapCreate
WriteFile
GetStdHandle
GetModuleFileNameA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
InitializeCriticalSectionAndSpinCount
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
SetFilePointer
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapSize
GetLocaleInfoA
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
CreateFileA
CloseHandle
FlushFileBuffers
GetModuleHandleA
user32
LoadIconW
Sections
.text Size: 54KB - Virtual size: 53KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 173KB - Virtual size: 172KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 39.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 57KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ