Static task
static1
Behavioral task
behavioral1
Sample
efc80e42ba82d7bc17647da2c9e5954b23d88b67ce278b4a8e17b59971fa3a05.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
efc80e42ba82d7bc17647da2c9e5954b23d88b67ce278b4a8e17b59971fa3a05.exe
Resource
win10v2004-20240412-en
General
-
Target
efc80e42ba82d7bc17647da2c9e5954b23d88b67ce278b4a8e17b59971fa3a05
-
Size
76KB
-
MD5
08bab81ac25b2d316813a6ca40b25a86
-
SHA1
60c97aa4df52bc6ca5b0ecda62fc0a8235867a3c
-
SHA256
efc80e42ba82d7bc17647da2c9e5954b23d88b67ce278b4a8e17b59971fa3a05
-
SHA512
9295f0878c98c4d9ea106af3d3e1676f2e860aa553d849733aeaa54d3b5b6ba87eb6a3776c96cf8263f5e2f3fbf38a9719144c28ffce898ec47213f039d8272c
-
SSDEEP
768:I6VbMMX14U4hE7OGifqOA8evx30xqt1cn:VbMueU4hE7OPfqO8vd0ka
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource efc80e42ba82d7bc17647da2c9e5954b23d88b67ce278b4a8e17b59971fa3a05
Files
-
efc80e42ba82d7bc17647da2c9e5954b23d88b67ce278b4a8e17b59971fa3a05.exe windows:4 windows x64 arch:x64
74a57b47eed456375bf9cee0bdd52bd1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
RegCloseKey
RegDeleteKeyW
RegEnumKeyExW
RegOpenKeyExW
RegQueryValueExW
kernel32
CompareStringW
CreateProcessW
DelayLoadFailureHook
ExitProcess
FormatMessageW
GetCommandLineW
GetConsoleOutputCP
GetExitCodeProcess
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleW
GetProcAddress
GetStdHandle
GetThreadLocale
GetTickCount
HeapAlloc
HeapFree
HeapReAlloc
IsBadStringPtrW
IsWow64Process
LocalFree
ResolveDelayLoadedAPI
WaitForSingleObject
WideCharToMultiByte
Wow64DisableWow64FsRedirection
Wow64RevertWow64FsRedirection
WriteConsoleW
WriteFile
lstrcmpW
lstrcmpiW
ucrtbase
__acrt_iob_func
__p___argc
__p___wargv
__stdio_common_vsprintf
_configure_wide_argv
_get_initial_wide_environment
_initialize_wide_environment
_set_app_type
_strdup
exit
free
fwrite
getenv
memcmp
memmove
qsort
strchr
strcmp
strcpy
strcspn
strlen
Sections
.text Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 128B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pdata Size: 4KB - Virtual size: 288B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xdata Size: 4KB - Virtual size: 304B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 352B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 40KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE