Static task
static1
Behavioral task
behavioral1
Sample
3388e2c6e95c0892386f3a4d7eab3b4e9c6d239e5f47f82e7416268396c9db5a.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
3388e2c6e95c0892386f3a4d7eab3b4e9c6d239e5f47f82e7416268396c9db5a.exe
Resource
win10v2004-20240419-en
General
-
Target
3388e2c6e95c0892386f3a4d7eab3b4e9c6d239e5f47f82e7416268396c9db5a
-
Size
585KB
-
MD5
c15df5ac6e080dd520b5079478c55816
-
SHA1
4b9f8f5c9712c628d28e84df6414f7b3d4fadfdb
-
SHA256
3388e2c6e95c0892386f3a4d7eab3b4e9c6d239e5f47f82e7416268396c9db5a
-
SHA512
c52154b6377ded404c66471540753ae0e5c6dd235e9ba818db51430b705c6a364fa236c819a114a168295802948b820beee72460bfbd644c35e905f428ab94ee
-
SSDEEP
12288:PsBzFl+zxDyMu9sitNRlxQBZdyEmDpjdeD6UrfEX6aUn/uW4a2:YMuVr1jQZEX6aUnhb2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3388e2c6e95c0892386f3a4d7eab3b4e9c6d239e5f47f82e7416268396c9db5a
Files
-
3388e2c6e95c0892386f3a4d7eab3b4e9c6d239e5f47f82e7416268396c9db5a.exe windows:6 windows x64 arch:x64
7d6c8b2d07578017e8e4f2fac376017c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
GetCurrentProcessId
SetEnvironmentVariableA
GetModuleFileNameA
FileTimeToSystemTime
GetLastError
WideCharToMultiByte
EncodePointer
DecodePointer
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
SetLastError
InitializeCriticalSectionAndSpinCount
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetModuleHandleW
GetProcAddress
MultiByteToWideChar
GetStringTypeW
CompareStringW
LCMapStringW
GetLocaleInfoW
GetCPInfo
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentThreadId
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
FormatMessageA
LoadLibraryA
GetThreadLocale
RtlUnwindEx
RtlPcToFileHeader
RaiseException
FreeLibrary
LoadLibraryExW
GetStdHandle
WriteFile
GetModuleFileNameW
ExitProcess
GetModuleHandleExW
GetCommandLineA
GetCommandLineW
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
HeapFree
CloseHandle
HeapAlloc
GetFileType
GetConsoleOutputCP
GetConsoleMode
GetFileSizeEx
SetFilePointerEx
ReadFile
ReadConsoleW
FlushFileBuffers
HeapReAlloc
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
SetStdHandle
GetProcessHeap
CreateFileW
HeapSize
WriteConsoleW
RtlUnwind
Sections
.text Size: 231KB - Virtual size: 230KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 120KB - Virtual size: 120KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.trace Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gxfg Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gehcont Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 174KB - Virtual size: 176KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ