Static task
static1
Behavioral task
behavioral1
Sample
154aad6fa244bbbf1b7d740a3553c66d2bc10735a18641abeda60162fc1fcdc0.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
154aad6fa244bbbf1b7d740a3553c66d2bc10735a18641abeda60162fc1fcdc0.exe
Resource
win10v2004-20240709-en
General
-
Target
154aad6fa244bbbf1b7d740a3553c66d2bc10735a18641abeda60162fc1fcdc0.exe
-
Size
367KB
-
MD5
594d02362194ea0d57399327bbea5044
-
SHA1
7b61ed6de89af4971072504fa3d2a750395be054
-
SHA256
154aad6fa244bbbf1b7d740a3553c66d2bc10735a18641abeda60162fc1fcdc0
-
SHA512
ca1aa68e2fd19cc5447d2621134b0e529182f189b2038c2d32a7c19ee1258200322603c769521cabf9a8401c6bef799c6bb36140187dcb0462441536676cc470
-
SSDEEP
3072:JTEOTTn0vMVaHzIVEX2sg3VktbQ0+NyxaWtls24E/ZX2CQvTH:JlTTn0vMcIVEX2sgoc0+k3ls27VDQvT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 154aad6fa244bbbf1b7d740a3553c66d2bc10735a18641abeda60162fc1fcdc0.exe
Files
-
154aad6fa244bbbf1b7d740a3553c66d2bc10735a18641abeda60162fc1fcdc0.exe.exe windows:5 windows x86 arch:x86
dd3461dcf5778e48bd33236a57de1e0e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapCompact
SetEndOfFile
LocalCompact
CreateHardLinkA
LoadLibraryW
ReadConsoleInputA
IsBadCodePtr
GetACP
IsBadStringPtrA
GlobalUnlock
GetLastError
SetLastError
GetProcAddress
AttachConsole
CreateJobSet
LoadLibraryA
LocalAlloc
AddAtomW
CreateFileA
HeapLock
EnumResourceTypesW
GetModuleFileNameA
GetCurrentDirectoryA
GetFileTime
Module32NextW
GetDiskFreeSpaceExW
TerminateJobObject
CheckRemoteDebuggerPresent
CloseHandle
CreateFileW
FlushFileBuffers
GetStringTypeW
LCMapStringW
WriteConsoleW
CreateEventW
EnumResourceNamesW
SetStdHandle
RaiseException
HeapAlloc
GetModuleHandleW
ExitProcess
DecodePointer
GetCommandLineA
HeapSetInformation
GetStartupInfoW
IsProcessorFeaturePresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
TerminateProcess
GetCurrentProcess
HeapFree
WriteFile
GetStdHandle
GetModuleFileNameW
HeapCreate
ReadFile
EnterCriticalSection
LeaveCriticalSection
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
Sleep
SetFilePointer
GetConsoleCP
GetConsoleMode
GetCPInfo
GetOEMCP
IsValidCodePage
MultiByteToWideChar
RtlUnwind
HeapSize
HeapReAlloc
user32
GetMessageTime
GetKeyboardLayout
CharUpperBuffA
SetCursorPos
LoadMenuW
GetSysColorBrush
GetSystemMetrics
SetCaretPos
gdi32
GetCharWidthW
ole32
CoUnmarshalHresult
Sections
.text Size: 158KB - Virtual size: 158KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 148KB - Virtual size: 28.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.socum Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.sobi Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ