Static task
static1
Behavioral task
behavioral1
Sample
tmp_1694527752.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
tmp_1694527752.exe
Resource
win10v2004-20240426-en
General
-
Target
tmp_1694527752.exe
-
Size
66KB
-
MD5
0ae657ac3ec805132a579971e182f2ca
-
SHA1
cc2659b86636d18504989d5f56ff35a8047ef41f
-
SHA256
14dfd63b88d40fc28aee282a6f12db1acc8ddb2a411ef42c056ca322ea5009d4
-
SHA512
3245fa3374bfdcee7ff668d7629837f5f3634ff2a11f16944efacb1341a3b0275842cfc95d7069ec365c3ad7b12b973812fbdb4eb2e75f5bb5ffd513830141a3
-
SSDEEP
1536:mDXPXdb6Ep1TxLcupqdg7ERfjM16oF/070:mDftb6c1TxLcuovg16ZI
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource tmp_1694527752.exe
Files
-
tmp_1694527752.exe.exe windows:4 windows x86 arch:x86
69bf0fad56f684f7f153bd2f8039bcbb
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
CreateProcessA
DeleteCriticalSection
EnterCriticalSection
GetCommandLineA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetLastError
GetModuleFileNameA
GetModuleHandleW
GetProcAddress
GetStartupInfoA
GetSystemTimeAsFileTime
GetTickCount
HeapAlloc
HeapCreate
InitializeCriticalSection
IsDBCSLeadByteEx
LeaveCriticalSection
MultiByteToWideChar
QueryPerformanceCounter
SetUnhandledExceptionFilter
Sleep
TerminateProcess
TlsGetValue
UnhandledExceptionFilter
VirtualProtect
VirtualQuery
WaitForSingleObject
WideCharToMultiByte
msvcrt
__dllonexit
__getmainargs
__initenv
__lconv_init
__mb_cur_max
__set_app_type
__setusermatherr
_acmdln
_amsg_exit
_cexit
_errno
_fmode
_initterm
_iob
_lock
_onexit
_strrev
_unlock
calloc
exit
fprintf
fputc
free
fwrite
getc
getenv
islower
isspace
isupper
isxdigit
localeconv
malloc
memcpy
memmove
realloc
setlocale
signal
strchr
strcpy
strerror
strlen
strncmp
strncpy
strtok
strtol
strtoul
abort
tolower
ungetc
vfprintf
wcslen
atoi
user32
EnumWindows
Sections
.text Size: 55KB - Virtual size: 55KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 144B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 3KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 52B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE