Static task
static1
Behavioral task
behavioral1
Sample
687df4487300e25362283cf8d5fcde307275da3c83d39b650bd778680634cc88.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
687df4487300e25362283cf8d5fcde307275da3c83d39b650bd778680634cc88.exe
Resource
win10v2004-20240611-en
General
-
Target
687df4487300e25362283cf8d5fcde307275da3c83d39b650bd778680634cc88.exe
-
Size
83KB
-
MD5
4455376a916e4e4e128b098480245dec
-
SHA1
10ea9a8572ba3dc0a0d63b627076673a92234012
-
SHA256
687df4487300e25362283cf8d5fcde307275da3c83d39b650bd778680634cc88
-
SHA512
4a12cf6075a6c76f2d3141cbb5b27a5f52d6e6eac2d95bf3f3471097656767336ed49a8f12374d7265187870763de11f7891c70c242d98301ce796e3f6e104f2
-
SSDEEP
1536:UYWHRuvlyyWvSTbCL6PaDeojUez3DMAZkVPTwqHnFX:UHxEWvLdeojUez3DMSkVPTw
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 687df4487300e25362283cf8d5fcde307275da3c83d39b650bd778680634cc88.exe
Files
-
687df4487300e25362283cf8d5fcde307275da3c83d39b650bd778680634cc88.exe.exe windows:4 windows x86 arch:x86
1a03a256b57fce4e87a6f225bddc2364
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
OpenProcess
LocalAlloc
CreateEventA
LocalFree
GetLastError
InterlockedIncrement
ReadFile
WriteFile
DisconnectNamedPipe
InterlockedDecrement
SetEvent
CreateProcessA
WaitForSingleObject
GetExitCodeProcess
CreateNamedPipeA
ConnectNamedPipe
GetCurrentProcessId
CloseHandle
ExitThread
ResumeThread
CreateThread
GetModuleHandleA
GetCommandLineA
GetVersionExA
TlsAlloc
SetLastError
GetCurrentThreadId
TlsFree
TlsSetValue
TlsGetValue
GetProcAddress
ExitProcess
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
HeapFree
HeapAlloc
EnterCriticalSection
LeaveCriticalSection
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
DeleteCriticalSection
HeapDestroy
HeapCreate
VirtualFree
SetFilePointer
GetACP
GetOEMCP
GetCPInfo
VirtualAlloc
HeapReAlloc
RtlUnwind
InterlockedExchange
VirtualQuery
LoadLibraryA
InitializeCriticalSection
SetStdHandle
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
GetLocaleInfoA
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
LCMapStringA
LCMapStringW
HeapSize
FlushFileBuffers
VirtualProtect
GetSystemInfo
advapi32
RegisterServiceCtrlHandlerA
OpenProcessToken
GetTokenInformation
AllocateAndInitializeSid
EqualSid
FreeSid
OpenSCManagerA
OpenServiceA
CloseServiceHandle
DeleteService
SetServiceStatus
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
StartServiceCtrlDispatcherA
Sections
.text Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE