Static task
static1
Behavioral task
behavioral1
Sample
50ff16712f7d212bbbcbafb03460836c6308ef7b1cfeeff7d608eb39f5a40cb9.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
50ff16712f7d212bbbcbafb03460836c6308ef7b1cfeeff7d608eb39f5a40cb9.exe
Resource
win10v2004-20240704-en
General
-
Target
50ff16712f7d212bbbcbafb03460836c6308ef7b1cfeeff7d608eb39f5a40cb9.exe
-
Size
2.3MB
-
MD5
119cb126cfe407873c893b256b6c053b
-
SHA1
ac6166c7e0359cc6d93cc7f0c934694785b3b471
-
SHA256
50ff16712f7d212bbbcbafb03460836c6308ef7b1cfeeff7d608eb39f5a40cb9
-
SHA512
5958df4084954787b4ac5f0ef1c8bd36190cc391380c4bab4ce8838b3aad198fcf0a5617c2923307d3c533400a86b37e1f299e62c67c0ce9dfc9606c3c2b39b6
-
SSDEEP
49152:GInadoC7p3kJDcCiWeu9EaY+j4gc25ZsNa:GQadoo3oDBiWeuOJ+wfNa
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 50ff16712f7d212bbbcbafb03460836c6308ef7b1cfeeff7d608eb39f5a40cb9.exe
Files
-
50ff16712f7d212bbbcbafb03460836c6308ef7b1cfeeff7d608eb39f5a40cb9.exe.exe windows:6 windows x64 arch:x64
54cd4dc9a0c19144aaa7d5cc22bed4e6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
user32
GetMessageW
FindWindowA
MessageBoxA
KillTimer
SetTimer
ShowWindow
DispatchMessageW
TranslateMessage
wsprintfW
oleaut32
SysAllocString
SafeArrayCreateVector
SafeArrayPutElement
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayCreate
kernel32
IsDebuggerPresent
WriteConsoleW
CreateFileW
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
HeapReAlloc
HeapSize
SetFilePointerEx
GetProcessHeap
LCMapStringW
CompareStringW
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
CreateFileA
GetDiskFreeSpaceExA
GetTempFileNameW
CloseHandle
GetLastError
QueryPerformanceCounter
QueryPerformanceFrequency
WaitForSingleObject
CreateMutexW
CreateEventW
GetCurrentProcess
GetCurrentProcessId
OpenProcess
GetSystemTime
GetTickCount
VirtualAlloc
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
CreateTimerQueue
CreateTimerQueueTimer
DeleteTimerQueueEx
CreateJobObjectW
FreeLibrary
GetModuleFileNameW
GetModuleHandleW
GetProcAddress
LoadLibraryA
LoadLibraryW
lstrcpyW
lstrlenW
MultiByteToWideChar
WideCharToMultiByte
AllocConsole
LocalFree
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
GetStartupInfoW
RtlPcToFileHeader
RaiseException
RtlUnwindEx
SetLastError
EncodePointer
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
GetStdHandle
WriteFile
ExitProcess
GetModuleHandleExW
GetCommandLineA
GetCommandLineW
HeapFree
HeapAlloc
GetFileType
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
SetStdHandle
GetStringTypeW
Sections
.text Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 72KB - Virtual size: 71KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ