Static task
static1
Behavioral task
behavioral1
Sample
c320c5860127058f18c463d6b9f2579a521053f9d2e94a7682a0d113cd8b7ca4.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral2
Sample
c320c5860127058f18c463d6b9f2579a521053f9d2e94a7682a0d113cd8b7ca4.exe
Resource
win11-20240709-en
General
-
Target
c320c5860127058f18c463d6b9f2579a521053f9d2e94a7682a0d113cd8b7ca4
-
Size
250KB
-
MD5
8771225230ffe89e001ae89e77db6af4
-
SHA1
815db8d9a6ecf3909d903b2e37dcf37dec89c665
-
SHA256
c320c5860127058f18c463d6b9f2579a521053f9d2e94a7682a0d113cd8b7ca4
-
SHA512
1bc441ade9bcce14602e598cbe99b10f20a579156e4a6fb0e13a9e4a6c235ea0d988c430a970ad73884db98704e21444c7cdb2a215244b3aa045763e4576016d
-
SSDEEP
6144:E1aiBuqrWCHH62WawNYb/DdTEpkS4ZDk7rTa:EM8xrWC62WlA/JYp0ZA7/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c320c5860127058f18c463d6b9f2579a521053f9d2e94a7682a0d113cd8b7ca4
Files
-
c320c5860127058f18c463d6b9f2579a521053f9d2e94a7682a0d113cd8b7ca4.exe windows:5 windows x86 arch:x86
ee7b9204d7ceb98be0ebc644970885e1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapCompact
SetEndOfFile
LocalCompact
CreateHardLinkA
GlobalAlloc
LoadLibraryW
ReadConsoleInputA
AssignProcessToJobObject
IsBadWritePtr
GlobalUnlock
GetLastError
SetLastError
GetProcAddress
IsBadHugeWritePtr
CreateJobSet
VerLanguageNameW
LoadLibraryA
SetConsoleCtrlHandler
CreateEventW
AddAtomA
HeapWalk
EnumResourceTypesW
GetModuleFileNameA
GetOEMCP
EnumResourceNamesA
GetCurrentDirectoryA
GetFileTime
GetCurrentThreadId
Module32NextW
GetDiskFreeSpaceExW
WriteConsoleW
CloseHandle
FlushFileBuffers
GetConsoleMode
GetConsoleCP
SetStdHandle
SetFilePointer
HeapReAlloc
IsValidLocale
WideCharToMultiByte
InterlockedIncrement
InterlockedDecrement
InterlockedCompareExchange
InterlockedExchange
MultiByteToWideChar
GetStringTypeW
EncodePointer
DecodePointer
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapFree
HeapAlloc
GetCommandLineW
HeapSetInformation
GetStartupInfoW
GetCPInfo
RaiseException
RtlUnwind
LCMapStringW
IsProcessorFeaturePresent
GetModuleHandleW
ExitProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
HeapCreate
WriteFile
GetStdHandle
GetModuleFileNameW
ReadFile
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetLocaleInfoW
HeapSize
GetACP
IsValidCodePage
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
CreateFileW
user32
CharUpperBuffW
LoadMenuA
GetKeyboardLayout
CharUpperBuffA
SetCursorPos
GetSysColorBrush
GetSystemMetrics
SetCaretPos
GetMessageTime
Sections
.text Size: 143KB - Virtual size: 142KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 47KB - Virtual size: 28.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.buf Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gegaboy Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ