Static task
static1
Behavioral task
behavioral1
Sample
7504e9a4776b47f2efd082066eee2ac795fca4398d8ee85b6af6af217c0e583e.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
7504e9a4776b47f2efd082066eee2ac795fca4398d8ee85b6af6af217c0e583e.exe
Resource
win10-20240404-en
General
-
Target
7504e9a4776b47f2efd082066eee2ac795fca4398d8ee85b6af6af217c0e583e
-
Size
319KB
-
MD5
b3316f86c6b6295b3f9fcb0a2a36803f
-
SHA1
2769a937f0b048446847c7baf741a96387555da4
-
SHA256
7504e9a4776b47f2efd082066eee2ac795fca4398d8ee85b6af6af217c0e583e
-
SHA512
6157eb3557b2ee26d59f057458d89feb12fd84d47166844bb42641888ec2ed96297c75d3dd4bca057f1257b7e1d527da59ffd78ad8e53c75a2bed4893caf4110
-
SSDEEP
3072:qf9l4yMA2hubsyO+xcyaBOxWU4pTQLlKWxp/UqFk1NZbvrKpftYVdVLb8U:qFl4yMAn8RU4VQhKwp/U9N9vrM6VL9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 7504e9a4776b47f2efd082066eee2ac795fca4398d8ee85b6af6af217c0e583e
Files
-
7504e9a4776b47f2efd082066eee2ac795fca4398d8ee85b6af6af217c0e583e.exe windows:5 windows x86 arch:x86
2ecca6bf335e6e46e2c654a4a04282e2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetComputerNameA
HeapReAlloc
TryEnterCriticalSection
VirtualQuery
GetConsoleAliasExesLengthA
GetCommState
SetDefaultCommConfigW
HeapFree
UnlockFile
FreeEnvironmentStringsA
GetModuleHandleW
FindNextVolumeMountPointA
GetConsoleAliasesLengthA
GetDateFormatA
EnumTimeFormatsW
GlobalAlloc
LoadLibraryW
GetLocaleInfoW
IsBadWritePtr
GetAtomNameW
GetModuleFileNameW
SetCurrentDirectoryA
GetCurrentDirectoryW
GetLongPathNameW
GetProcAddress
FindVolumeMountPointClose
GetProcessHeaps
BuildCommDCBW
LoadLibraryA
SetConsoleOutputCP
CreatePipe
SetConsoleTitleW
VirtualProtect
SetCalendarInfoA
CloseHandle
CreateFileW
HeapAlloc
GetLastError
ExitProcess
DecodePointer
GetCommandLineW
HeapSetInformation
GetStartupInfoW
RaiseException
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
IsProcessorFeaturePresent
WriteFile
GetStdHandle
HeapCreate
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
SetFilePointer
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
Sleep
RtlUnwind
HeapSize
SetStdHandle
WriteConsoleW
MultiByteToWideChar
LCMapStringW
GetStringTypeW
FlushFileBuffers
user32
LoadIconW
ole32
CoTaskMemFree
Sections
.text Size: 49KB - Virtual size: 49KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 174KB - Virtual size: 174KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 83KB - Virtual size: 83KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ