Static task
static1
Behavioral task
behavioral1
Sample
de62b06958c364a3c4f69f54e7eab736b3d4e379501f51c056ae89d85fa05a8f.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
de62b06958c364a3c4f69f54e7eab736b3d4e379501f51c056ae89d85fa05a8f.exe
Resource
win10v2004-20240508-en
General
-
Target
de62b06958c364a3c4f69f54e7eab736b3d4e379501f51c056ae89d85fa05a8f
-
Size
1.2MB
-
MD5
ed075813c5a84f2448cfa3984963fbee
-
SHA1
f37034c64ffe5c15f6dfaf076f9635d34e1fd8da
-
SHA256
de62b06958c364a3c4f69f54e7eab736b3d4e379501f51c056ae89d85fa05a8f
-
SHA512
f3c5a3f491698aba096fe993f260af564fae29b07ad0f015187458084f5184d4fe5e13dac8aa42cf0132a98acef9fdfa1b37fba1c0ec9a8dce1434580dda0c6c
-
SSDEEP
24576:EhSIRfE5CQgsJAHBm1WFzdAaxl4haZPTj6TVNaba3r:MLM5M/zdAqTGVNaba7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource de62b06958c364a3c4f69f54e7eab736b3d4e379501f51c056ae89d85fa05a8f
Files
-
de62b06958c364a3c4f69f54e7eab736b3d4e379501f51c056ae89d85fa05a8f.exe windows:5 windows x86 arch:x86
50fe2bae29a7ba909696e72fcb2c2759
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
UnmapViewOfFile
GetFileAttributesW
CreateDirectoryW
GetLocalTime
SetEndOfFile
GetStdHandle
GetFileType
GetCurrentThreadId
GetModuleHandleA
QueryPerformanceCounter
GlobalMemoryStatus
LoadLibraryA
FlushConsoleInputBuffer
InterlockedDecrement
InterlockedIncrement
DuplicateHandle
EnterCriticalSection
LeaveCriticalSection
ExpandEnvironmentStringsW
CreateEventW
WaitForMultipleObjects
InterlockedCompareExchange
OutputDebugStringW
InitializeCriticalSection
InterlockedExchange
FlushFileBuffers
IsDebuggerPresent
SetEnvironmentVariableA
WriteConsoleW
SetStdHandle
GetConsoleCP
ReadConsoleW
SetFilePointerEx
GetACP
IsValidCodePage
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCPInfo
LoadLibraryExW
SetConsoleMode
ReadConsoleInputA
GetConsoleMode
SetConsoleCtrlHandler
AreFileApisANSI
GetModuleHandleExW
ExitProcess
IsProcessorFeaturePresent
GetSystemTimeAsFileTime
RtlUnwind
GetStringTypeW
DecodePointer
SetLastError
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetStartupInfoW
LocalFree
TerminateProcess
WideCharToMultiByte
MultiByteToWideChar
GetTickCount
GetSystemDirectoryW
FreeLibrary
Sleep
LoadLibraryW
GetModuleFileNameW
WTSGetActiveConsoleSessionId
GetCurrentProcessId
Process32NextW
EncodePointer
GetOEMCP
Process32FirstW
CreateToolhelp32Snapshot
GetCurrentProcess
SetFilePointer
WriteFile
ReadFile
GetProcAddress
CreateFileW
GetModuleHandleW
SetDllDirectoryW
GetCommandLineW
CloseHandle
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
GetLastError
RaiseException
GetProcessHeap
HeapSize
HeapFree
HeapReAlloc
HeapAlloc
HeapDestroy
SetEvent
user32
SendMessageTimeoutW
RegisterWindowMessageW
GetMessageW
TranslateMessage
DispatchMessageW
PostQuitMessage
CallWindowProcW
CreateWindowExW
IsWindow
DestroyWindow
GetWindowLongW
SetWindowLongW
GetWindowThreadProcessId
FindWindowA
MessageBoxA
GetUserObjectInformationW
GetProcessWindowStation
advapi32
AllocateAndInitializeSid
CheckTokenMembership
FreeSid
ImpersonateLoggedOnUser
RevertToSelf
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
ReportEventA
RegisterEventSourceA
DeregisterEventSource
shell32
CommandLineToArgvW
ShellExecuteW
shlwapi
PathAppendW
PathFindFileNameW
PathAddBackslashW
wtsapi32
WTSQueryUserToken
Sections
.text Size: 784KB - Virtual size: 784KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 267KB - Virtual size: 267KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 23KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 269KB - Virtual size: 269KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 41KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ