Static task
static1
Behavioral task
behavioral1
Sample
b3a3b161114bd3688ee9d459245418476f6dda90d3fc1addb9df9637ae05d5da.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b3a3b161114bd3688ee9d459245418476f6dda90d3fc1addb9df9637ae05d5da.exe
Resource
win10v2004-20240704-en
General
-
Target
b3a3b161114bd3688ee9d459245418476f6dda90d3fc1addb9df9637ae05d5da
-
Size
960KB
-
MD5
196287cf680cf3d6bed3a92b9e5db9b4
-
SHA1
3ba5d8e3cedbec3de874c2730f161da210ff9673
-
SHA256
b3a3b161114bd3688ee9d459245418476f6dda90d3fc1addb9df9637ae05d5da
-
SHA512
94d7d045a74a94a99670466cb663523cfa8e22df8c39bcdeb41af9fb551f8c4c01d81d11bd54daefb64ea8609d524b6d2b0d15aa952978a0b2d55cff0ddf4291
-
SSDEEP
24576:JqR9mv2jxpFQCqKtFZA0vfopY6GGHnelouGlUHc6SehN:J09mCp6OcmfMY6GseyXlUHcA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b3a3b161114bd3688ee9d459245418476f6dda90d3fc1addb9df9637ae05d5da
Files
-
b3a3b161114bd3688ee9d459245418476f6dda90d3fc1addb9df9637ae05d5da.exe windows:6 windows x64 arch:x64
c5f53bcc8ea3e5709926642c303e4ae4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
GetModuleHandleA
GetSystemDefaultLangID
Sleep
AddVectoredExceptionHandler
GetProcAddress
GetModuleHandleW
WriteConsoleW
CreateFileW
HeapSize
GetProcessHeap
EnumTimeFormatsEx
GlobalMemoryStatusEx
RemoveVectoredExceptionHandler
SetStdHandle
SetEnvironmentVariableW
WideCharToMultiByte
GetCurrentThreadId
CloseHandle
WaitForSingleObjectEx
GetExitCodeThread
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
EncodePointer
DecodePointer
MultiByteToWideChar
LCMapStringEx
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetStringTypeW
GetCPInfo
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
GetCurrentProcessId
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
RtlUnwindEx
RtlPcToFileHeader
RaiseException
GetLastError
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
ExitProcess
GetModuleHandleExW
CreateThread
ExitThread
FreeLibraryAndExitThread
GetStdHandle
WriteFile
GetModuleFileNameW
HeapAlloc
HeapFree
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetFileType
GetTimeZoneInformation
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
ReadFile
GetFileSizeEx
SetFilePointerEx
ReadConsoleW
HeapReAlloc
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
RtlUnwind
user32
EnumWindows
GetCursorPos
advapi32
CryptGenRandom
CryptAcquireContextW
Sections
.text Size: 288KB - Virtual size: 287KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 98KB - Virtual size: 97KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 244B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 551KB - Virtual size: 550KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ