Static task
static1
Behavioral task
behavioral1
Sample
07440021c21067958af8808c382520d359ba8dd23a39a02892aa1e1cd0fdef1a.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
07440021c21067958af8808c382520d359ba8dd23a39a02892aa1e1cd0fdef1a.exe
Resource
win10-20240404-en
General
-
Target
07440021c21067958af8808c382520d359ba8dd23a39a02892aa1e1cd0fdef1a
-
Size
316KB
-
MD5
90639f893099ececc76450b1f65abd11
-
SHA1
5ae29b4bfdffa6982fd1a70461a46868cc108845
-
SHA256
07440021c21067958af8808c382520d359ba8dd23a39a02892aa1e1cd0fdef1a
-
SHA512
00c83a9bbbe792068f1ae1a9e48da263f492b031d1e73bd73c4d137fbc4497bdcfd562d08f02e31f3e6439840f62d4bab1723976f82c34b37f80bd0f939abc9b
-
SSDEEP
6144:bDvo6p6eCOq3HKKgBC5gm9XwVNU1LGZTb+el:bDvo6p6Eq3HKKgagH/UgZx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 07440021c21067958af8808c382520d359ba8dd23a39a02892aa1e1cd0fdef1a
Files
-
07440021c21067958af8808c382520d359ba8dd23a39a02892aa1e1cd0fdef1a.exe windows:5 windows x86 arch:x86
8f3a77672c54b3a823c7128091b9055b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LocalAlloc
GetLastError
SetLastError
ReadProcessMemory
GetTickCount
_lopen
OpenEventA
LoadLibraryW
LoadLibraryExW
GetModuleFileNameW
GetModuleHandleW
GetSystemDirectoryW
CreateDirectoryA
SetFileAttributesW
GetVolumeInformationA
GetProcAddress
BuildCommDCBA
CommConfigDialogA
SetComputerNameExA
SetInformationJobObject
FindNextVolumeA
SetVolumeMountPointA
GetACP
GetLocaleInfoA
GetNumberFormatA
GetStringTypeW
SetConsoleCursorInfo
AllocConsole
AddConsoleAliasW
CloseHandle
WriteConsoleW
SetFilePointerEx
IsBadStringPtrA
InterlockedExchange
EncodePointer
DecodePointer
RaiseException
RtlUnwind
GetCommandLineW
IsProcessorFeaturePresent
HeapAlloc
HeapFree
ExitProcess
GetModuleHandleExW
MultiByteToWideChar
WideCharToMultiByte
HeapSize
GetCurrentThreadId
GetProcessHeap
GetStdHandle
GetFileType
DeleteCriticalSection
GetStartupInfoW
WriteFile
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
Sleep
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
IsDebuggerPresent
LCMapStringW
EnterCriticalSection
LeaveCriticalSection
IsValidCodePage
GetOEMCP
GetCPInfo
HeapReAlloc
OutputDebugStringW
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetStdHandle
CreateFileW
user32
GetSysColorBrush
DdeKeepStringHandle
gdi32
GetCharWidthA
Sections
.text Size: 57KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 94KB - Virtual size: 40.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 137KB - Virtual size: 137KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ