Static task
static1
Behavioral task
behavioral1
Sample
dc1d711273627549a9d192b6bda85a95ad8bc4080c44cb3b82fc4896e260e2e9.exe
Resource
win7-20240221-en
General
-
Target
dc1d711273627549a9d192b6bda85a95ad8bc4080c44cb3b82fc4896e260e2e9
-
Size
225KB
-
MD5
24a9a18aacea7ccfc56fa88bdf7cf54e
-
SHA1
298b107046a1a926621ae83fe581dfda90d5d179
-
SHA256
dc1d711273627549a9d192b6bda85a95ad8bc4080c44cb3b82fc4896e260e2e9
-
SHA512
5d88cdf144e40d05336567e10be7aa9baac9170d7e45e857e92038b1053d7dbe1953f78d454c5d0f80f02cfa8bac04a217f707bc3715e551e2f597f161845dc0
-
SSDEEP
3072:VSe5SusmVNMKeNILLn3bcdAvZwhZgPr5Nt3vO7OSeaetFU62/armG4Hg4tg3JDiu:118IP32oMZa53deetPnNqg5gLI
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource dc1d711273627549a9d192b6bda85a95ad8bc4080c44cb3b82fc4896e260e2e9
Files
-
dc1d711273627549a9d192b6bda85a95ad8bc4080c44cb3b82fc4896e260e2e9.exe windows:4 windows x86 arch:x86
0184fbac2438306f556d751946a24411
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
TerminateProcess
OpenProcess
GetCurrentThreadId
MultiByteToWideChar
WideCharToMultiByte
lstrlenW
GetLastError
InterlockedIncrement
InterlockedDecrement
lstrlenA
lstrcmpiA
IsDBCSLeadByte
FreeLibrary
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
GetModuleHandleA
GetModuleFileNameA
GetExitCodeProcess
DeleteFileA
Sleep
CreateEventA
OpenEventA
CloseHandle
OutputDebugStringA
CreateDirectoryA
SetFileAttributesA
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
RaiseException
SetEndOfFile
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
CreateProcessA
GetLocalTime
LoadLibraryA
FlushFileBuffers
GetSystemTimeAsFileTime
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlUnwind
HeapFree
HeapAlloc
VirtualProtect
VirtualAlloc
GetProcAddress
GetSystemInfo
VirtualQuery
HeapReAlloc
ReadFile
WriteFile
GetConsoleCP
GetConsoleMode
SetFilePointer
GetCommandLineA
GetProcessHeap
GetStartupInfoA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
SetHandleCount
GetStdHandle
GetFileType
HeapSize
ExitProcess
GetCPInfo
GetOEMCP
IsValidCodePage
SetStdHandle
CreateFileA
HeapDestroy
HeapCreate
VirtualFree
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
user32
CharNextA
DestroyWindow
MessageBoxA
UnregisterClassA
DefWindowProcA
advapi32
RegOpenKeyExA
RegEnumKeyExA
RegQueryInfoKeyA
RegSetValueExA
RegDeleteKeyA
RegCreateKeyExA
RegCloseKey
RegDeleteValueA
ole32
CoTaskMemRealloc
CoCreateInstance
CoUninitialize
CoInitialize
CoTaskMemFree
CoTaskMemAlloc
oleaut32
VarUI4FromStr
comctl32
InitCommonControlsEx
psapi
GetModuleBaseNameA
EnumProcessModules
EnumProcesses
Sections
.text Size: 92KB - Virtual size: 90KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 8KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 80KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE