Static task
static1
Behavioral task
behavioral1
Sample
129a6ead35ab895f1f20aa269fc512da8034e66fdd2fa5be39801f6adc747fd0.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
129a6ead35ab895f1f20aa269fc512da8034e66fdd2fa5be39801f6adc747fd0.exe
Resource
win10v2004-20240426-en
General
-
Target
129a6ead35ab895f1f20aa269fc512da8034e66fdd2fa5be39801f6adc747fd0.exe
-
Size
78KB
-
MD5
ea551f62e03de682a7f5060ce19a34ae
-
SHA1
409ea43724ccbce49c82f048ae26ca68bfd4a51d
-
SHA256
129a6ead35ab895f1f20aa269fc512da8034e66fdd2fa5be39801f6adc747fd0
-
SHA512
66f0e909b576b0427aec2de09c1baeff9920fc33504293e70b162f46cd6f5f84d9b3da4303062b790dc67a523ce9fd643b8eaf0cac8d1294318b1b1033bc6063
-
SSDEEP
1536:k3xhxT6fFHA/N9ZuedcFCSzkdZkr27Bqa9XH:ihxT6fJAVDuedcFCtdZkGB33
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 129a6ead35ab895f1f20aa269fc512da8034e66fdd2fa5be39801f6adc747fd0.exe
Files
-
129a6ead35ab895f1f20aa269fc512da8034e66fdd2fa5be39801f6adc747fd0.exe.exe windows:5 windows x64 arch:x64
5c1e1a097c044357c4eefded92c1ce68
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
GetCurrentThread
LoadLibraryW
GetProcAddress
QueueUserAPC
GetModuleHandleA
VirtualProtect
GetCommandLineW
GetStartupInfoW
GetLastError
HeapFree
EncodePointer
DecodePointer
HeapAlloc
RaiseException
RtlPcToFileHeader
SetUnhandledExceptionFilter
GetModuleHandleW
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameW
RtlUnwindEx
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
FlsGetValue
FlsSetValue
FlsFree
SetLastError
GetCurrentThreadId
FlsAlloc
HeapSetInformation
GetVersion
HeapCreate
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
Sleep
HeapSize
LeaveCriticalSection
EnterCriticalSection
UnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
TerminateProcess
GetCurrentProcess
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapReAlloc
WideCharToMultiByte
LCMapStringW
MultiByteToWideChar
GetStringTypeW
user32
MessageBoxW
Sections
.text Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 944B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rsrc Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ