Static task
static1
Behavioral task
behavioral1
Sample
0d469e70b67e4c793547ba3e17eb328dfa9d9d61206106ff7465bdbb35b57d0c.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
0d469e70b67e4c793547ba3e17eb328dfa9d9d61206106ff7465bdbb35b57d0c.exe
Resource
win11-20240611-en
General
-
Target
0d469e70b67e4c793547ba3e17eb328dfa9d9d61206106ff7465bdbb35b57d0c
-
Size
45KB
-
MD5
01b29e7c45075d9d419dcccfed358395
-
SHA1
b27f884e3b6ac83a04225fff35ba44610b312ff4
-
SHA256
0d469e70b67e4c793547ba3e17eb328dfa9d9d61206106ff7465bdbb35b57d0c
-
SHA512
1a306abbc893cf22e40c3dd610688365e6098d464fcd52e6a9ec9604f354e4ee42c2c8d26c45fde1280c39776bb7d1203ce0499bf1861a2cf7a63e61e718c9c4
-
SSDEEP
768:S3OaHhxTKQ4HzEurz2lIX3NH3OWyHN9ZuPwkDwXwY1uEFCeFzR:S33hxT6fFHA/N9ZuewcFCSzR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 0d469e70b67e4c793547ba3e17eb328dfa9d9d61206106ff7465bdbb35b57d0c
Files
-
0d469e70b67e4c793547ba3e17eb328dfa9d9d61206106ff7465bdbb35b57d0c.exe windows:5 windows x64 arch:x64
5c1e1a097c044357c4eefded92c1ce68
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
GetCurrentThread
LoadLibraryW
GetProcAddress
QueueUserAPC
GetModuleHandleA
VirtualProtect
GetCommandLineW
GetStartupInfoW
GetLastError
HeapFree
EncodePointer
DecodePointer
HeapAlloc
RaiseException
RtlPcToFileHeader
SetUnhandledExceptionFilter
GetModuleHandleW
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameW
RtlUnwindEx
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
FlsGetValue
FlsSetValue
FlsFree
SetLastError
GetCurrentThreadId
FlsAlloc
HeapSetInformation
GetVersion
HeapCreate
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
Sleep
HeapSize
LeaveCriticalSection
EnterCriticalSection
UnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
TerminateProcess
GetCurrentProcess
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapReAlloc
WideCharToMultiByte
LCMapStringW
MultiByteToWideChar
GetStringTypeW
user32
MessageBoxW
Sections
.text Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 944B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ