Static task
static1
Behavioral task
behavioral1
Sample
316458e5a60e42b00a832fc820f2d4ce6188328c2d4aba46ba2c7fb1ac0a8ea9.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
316458e5a60e42b00a832fc820f2d4ce6188328c2d4aba46ba2c7fb1ac0a8ea9.exe
Resource
win7-20240221-en
Behavioral task
behavioral3
Sample
316458e5a60e42b00a832fc820f2d4ce6188328c2d4aba46ba2c7fb1ac0a8ea9.exe
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
316458e5a60e42b00a832fc820f2d4ce6188328c2d4aba46ba2c7fb1ac0a8ea9.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral5
Sample
316458e5a60e42b00a832fc820f2d4ce6188328c2d4aba46ba2c7fb1ac0a8ea9.exe
Resource
win11-20240412-en
General
-
Target
316458e5a60e42b00a832fc820f2d4ce6188328c2d4aba46ba2c7fb1ac0a8ea9
-
Size
121KB
-
MD5
4a0240a655b8ae69c6c87faf66f4f479
-
SHA1
2171333c0c25744a40089863f97aa19236f7bcc0
-
SHA256
316458e5a60e42b00a832fc820f2d4ce6188328c2d4aba46ba2c7fb1ac0a8ea9
-
SHA512
4ee0bad174b6c575045a64878f54d45cd0670c243aef763502bd178bbefc7589971abc33ead9b838e0a0d6726834b823eb942a98b138a65baacbc8c77fae3aae
-
SSDEEP
1536:0W+caYNZXeWK3O9UmGGLbQd9AVaOoNTfqrvrKQr36/uInfNIOajxG/n5oscys2Dr:0WeeSOFhmmVadQTEYxk5Fsd21
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 316458e5a60e42b00a832fc820f2d4ce6188328c2d4aba46ba2c7fb1ac0a8ea9
Files
-
316458e5a60e42b00a832fc820f2d4ce6188328c2d4aba46ba2c7fb1ac0a8ea9.exe windows:6 windows x64 arch:x64
0da19a3ce7222cb0aeb5e48884a5cccc
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
bcrypt
BCryptHashData
BCryptDestroyHash
BCryptFinishHash
BCryptCreateHash
BCryptEncrypt
BCryptDuplicateHash
BCryptDestroyKey
BCryptGenRandom
BCryptSetProperty
BCryptCloseAlgorithmProvider
BCryptOpenAlgorithmProvider
BCryptSecretAgreement
BCryptImportKeyPair
BCryptDestroySecret
BCryptDeriveKey
BCryptExportKey
BCryptImportKey
crypt32
CryptDecodeObject
CryptBinaryToStringA
CryptStringToBinaryA
ws2_32
closesocket
gethostbyname
WSAStartup
send
socket
WSACleanup
recv
htons
setsockopt
WSAGetLastError
inet_addr
connect
inet_ntoa
secur32
InitSecurityInterfaceA
kernel32
CreateThread
TerminateThread
CloseHandle
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
WaitForSingleObject
FlushFileBuffers
GetFileSize
CreateFileA
GetFileAttributesA
SetFilePointer
GetModuleFileNameA
Sleep
GetConsoleWindow
GetConsoleScreenBufferInfo
SetConsoleTextAttribute
GetStdHandle
GetCurrentThreadId
GetLocalTime
GetTickCount
GetCommandLineW
LocalFree
GetEnvironmentVariableA
LoadLibraryA
ReadFile
WriteFile
user32
ShowWindow
advapi32
RegSetValueExA
RegOpenKeyExA
CryptAcquireContextA
CryptReleaseContext
RegCloseKey
RegQueryInfoKeyA
RegEnumValueA
shell32
CommandLineToArgvW
msvcrt
__CxxFrameHandler3
atexit
vprintf
free
malloc
vsprintf_s
_vscprintf
sscanf
_mkgmtime
time
wcstombs
memmove
memchr
memcmp
memcpy
memset
Sections
.text Size: 75KB - Virtual size: 75KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 39KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 320B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ