Static task
static1
Behavioral task
behavioral1
Sample
30dbf1ae3003da646465d4c7d870945c5185ec386cf47dbd474109e602faf9b6.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
30dbf1ae3003da646465d4c7d870945c5185ec386cf47dbd474109e602faf9b6.exe
Resource
win10v2004-20240426-en
General
-
Target
30dbf1ae3003da646465d4c7d870945c5185ec386cf47dbd474109e602faf9b6
-
Size
506KB
-
MD5
cea0667bfe2b41e51f5c20a7c40299b0
-
SHA1
cf4b0813bfaf5e024d4a67ce3d6399c8b80df8d4
-
SHA256
30dbf1ae3003da646465d4c7d870945c5185ec386cf47dbd474109e602faf9b6
-
SHA512
c863db2721106de5e1987d1d5df35588c0777637fb841d127e9f3d5f6cb5bd3d4584069b343f4de6c23a88f7de3c4dc56561cdbde8635c461364a24bfa65fbec
-
SSDEEP
12288:YARtWSJ1828y4OPOxpm5kz7txFPyuKcJHg61H:YA3WGxV4OGxpjbZhHv1H
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 30dbf1ae3003da646465d4c7d870945c5185ec386cf47dbd474109e602faf9b6
Files
-
30dbf1ae3003da646465d4c7d870945c5185ec386cf47dbd474109e602faf9b6.exe windows:5 windows x64 arch:x64
de361320741c3eefff5c87665ab4f6f4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
user32
SetForegroundWindow
MessageBoxA
ExitWindowsEx
EnumWindows
IsIconic
ShowWindow
MessageBoxW
GetLastActivePopup
IsWindowVisible
GetWindowThreadProcessId
MonitorFromPoint
advapi32
AdjustTokenPrivileges
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
OpenProcessToken
GetTokenInformation
ConvertSidToStringSidA
RegEnumKeyExA
RegOpenKeyExA
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
LookupPrivilegeValueA
ole32
CreateStreamOnHGlobal
CoCreateInstance
CoInitializeEx
GetHGlobalFromStream
CoUninitialize
kernel32
GetStringTypeW
GetStringTypeA
HeapReAlloc
QueryPerformanceCounter
GetTimeZoneInformation
EnumSystemLocalesA
IsValidLocale
InitializeCriticalSectionAndSpinCount
WriteConsoleA
SetStdHandle
CompareStringA
CompareStringW
GetLocaleInfoW
SetEndOfFile
GetLocaleInfoA
SetCurrentDirectoryA
HeapCreate
HeapSetInformation
IsValidCodePage
GetOEMCP
GetACP
GetLastError
CreateFileW
SetFilePointer
WriteFile
ReadFile
GetProcAddress
LoadLibraryA
GetUserDefaultLCID
CloseHandle
CreateFileA
CreateDirectoryA
FlushFileBuffers
WriteConsoleW
GetFileType
GetStdHandle
GetLongPathNameW
ExitProcess
RemoveDirectoryA
MultiByteToWideChar
AreFileApisANSI
FindClose
FindFirstFileA
FindFirstFileW
TerminateProcess
GetExitCodeProcess
CreateProcessW
GetWindowsDirectoryW
SetHandleInformation
CreatePipe
GetShortPathNameA
GetModuleFileNameA
GetShortPathNameW
GetModuleFileNameW
GetCurrentProcessId
GetLongPathNameA
FoldStringW
GetWindowsDirectoryA
GetEnvironmentVariableW
GetEnvironmentVariableA
GetTempPathW
GetTempPathA
GetTempFileNameA
GetFullPathNameW
GetFullPathNameA
FindNextFileA
DeleteFileA
LoadLibraryW
FreeEnvironmentStringsW
GetEnvironmentStringsW
FreeEnvironmentStringsA
GetEnvironmentStrings
GetExitCodeThread
WaitForSingleObject
CreateThread
GetConsoleOutputCP
SetEnvironmentVariableA
GetProcessHeap
GetCurrentDirectoryA
GetVersionExA
CreateProcessA
SearchPathA
GetSystemTimeAsFileTime
EnterCriticalSection
InitializeCriticalSection
LeaveCriticalSection
Sleep
GetMailslotInfo
CreateMailslotA
GetCommandLineW
CreateSemaphoreA
LocalFree
GetCurrentProcess
LocalAlloc
SizeofResource
LockResource
LoadResource
FindResourceA
GlobalUnlock
GlobalSize
GlobalLock
GetTickCount
AllocConsole
GetModuleHandleA
LoadLibraryExA
SetEnvironmentVariableW
SetCurrentDirectoryW
WideCharToMultiByte
DeleteCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
RaiseException
RtlPcToFileHeader
RtlUnwindEx
CreateDirectoryW
RemoveDirectoryW
HeapAlloc
HeapFree
DebugBreak
GetCommandLineA
GetStartupInfoA
LCMapStringA
LCMapStringW
GetCPInfo
EncodePointer
DecodePointer
FlsGetValue
FlsSetValue
FlsFree
SetLastError
GetCurrentThreadId
FlsAlloc
HeapSize
GetModuleHandleW
GetConsoleCP
GetConsoleMode
SetHandleCount
Sections
.text Size: 243KB - Virtual size: 243KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 64KB - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 71KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 169KB - Virtual size: 169KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ