Static task
static1
Behavioral task
behavioral1
Sample
2c798a3cbff30656eda9152c83197eb5ae947b6125aa5ac1fe3e908b49333333.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
2c798a3cbff30656eda9152c83197eb5ae947b6125aa5ac1fe3e908b49333333.exe
Resource
win11-20240611-en
General
-
Target
2c798a3cbff30656eda9152c83197eb5ae947b6125aa5ac1fe3e908b49333333
-
Size
71KB
-
MD5
fc51b9880f028f0de17682f992c8911d
-
SHA1
93b1419c61d8b759942156fc39472311028b35d1
-
SHA256
2c798a3cbff30656eda9152c83197eb5ae947b6125aa5ac1fe3e908b49333333
-
SHA512
efda22b9a9cd1c383eb5aea7f7369a0288969f578d1bd353b9c4cc66c4280cba3845b00ec4b49b074c2ef81eab0cc645159572dfba1aafd4472469ae0f100a56
-
SSDEEP
1536:tJzTIW8A0fY3WU2M1Fq/3jPd/6k0700000000000t:HzTIW8A0wWU2M1FqPDEk07000000000r
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2c798a3cbff30656eda9152c83197eb5ae947b6125aa5ac1fe3e908b49333333
Files
-
2c798a3cbff30656eda9152c83197eb5ae947b6125aa5ac1fe3e908b49333333.exe windows:5 windows x64 arch:x64
66a76438aae4895269af9cbab80f4b40
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
LoadLibraryW
GetProcAddress
GetCommandLineW
GetStartupInfoW
GetLastError
HeapFree
EncodePointer
DecodePointer
HeapAlloc
RaiseException
RtlPcToFileHeader
SetUnhandledExceptionFilter
GetModuleHandleW
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameW
RtlUnwindEx
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
FlsGetValue
FlsSetValue
FlsFree
SetLastError
GetCurrentThreadId
FlsAlloc
HeapSetInformation
GetVersion
HeapCreate
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
Sleep
HeapSize
LeaveCriticalSection
EnterCriticalSection
UnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
TerminateProcess
GetCurrentProcess
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapReAlloc
WideCharToMultiByte
LCMapStringW
MultiByteToWideChar
GetStringTypeW
user32
MessageBoxW
Sections
.text Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 560B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 26KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ