Static task
static1
Behavioral task
behavioral1
Sample
19041224ad187d824a1a83265e6909fd03ea32c54af482ac764d5b37cb0a65aa.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral2
Sample
19041224ad187d824a1a83265e6909fd03ea32c54af482ac764d5b37cb0a65aa.exe
Resource
win11-20240508-en
General
-
Target
19041224ad187d824a1a83265e6909fd03ea32c54af482ac764d5b37cb0a65aa
-
Size
442KB
-
MD5
fdfb32f3ce5d95c3c368d259f412f362
-
SHA1
cfb0ad6b69224c8a672296cdbb415483a05ce26f
-
SHA256
19041224ad187d824a1a83265e6909fd03ea32c54af482ac764d5b37cb0a65aa
-
SHA512
1ba4e33936dde65cd2e21621d86122625855a60ef634ee743685af796586920745156b1c2a002a94704ea65def79c656e21ade5c3afee515863d2d6c604ac37f
-
SSDEEP
6144:TaWPBz2i/YHza1g/Uw05rUKCbjwnEPj/jfa2nCPjCnbSB4IkH1WTv:jPBzVgHz8gsd5rCbkEb7fSP5B9kg
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 19041224ad187d824a1a83265e6909fd03ea32c54af482ac764d5b37cb0a65aa
Files
-
19041224ad187d824a1a83265e6909fd03ea32c54af482ac764d5b37cb0a65aa.exe windows:5 windows x86 arch:x86
d3fddeaa0619c7cbb54b92b221528616
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReadProcessMemory
GetTickCount
_lopen
OpenEventA
LoadLibraryA
LoadLibraryExA
GetModuleFileNameA
GetModuleHandleW
GetWindowsDirectoryA
CreateDirectoryW
SetFileAttributesW
GetVolumeInformationA
IsBadStringPtrW
SetLastError
SetComputerNameA
SetInformationJobObject
FindFirstVolumeMountPointW
GetOEMCP
GetCalendarInfoA
GetNumberFormatA
FoldStringA
SetConsoleCursorPosition
SetConsoleTextAttribute
AddConsoleAliasA
SetEndOfFile
WriteConsoleW
CloseHandle
GetLastError
LocalAlloc
BuildCommDCBA
GetProcAddress
CreateFileW
OutputDebugStringW
WideCharToMultiByte
MultiByteToWideChar
GetStringTypeW
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
EncodePointer
DecodePointer
HeapFree
RaiseException
RtlUnwind
GetCommandLineW
GetCPInfo
HeapAlloc
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
Sleep
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
IsProcessorFeaturePresent
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
ExitProcess
GetModuleHandleExW
AreFileApisANSI
HeapSize
GetProcessHeap
IsDebuggerPresent
ReadFile
SetFilePointerEx
GetCurrentThreadId
GetStdHandle
GetFileType
GetModuleFileNameW
WriteFile
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
IsValidCodePage
GetACP
HeapReAlloc
LoadLibraryExW
GetConsoleMode
ReadConsoleW
SetStdHandle
FlushFileBuffers
GetConsoleCP
user32
DdeCmpStringHandles
GetMenu
gdi32
GetCharWidthA
advapi32
ClearEventLogA
DeleteAce
winhttp
WinHttpReadData
Sections
.text Size: 102KB - Virtual size: 102KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 34KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 190KB - Virtual size: 2.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 113KB - Virtual size: 113KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ