Static task
static1
Behavioral task
behavioral1
Sample
69860e0dd760e72af45ce75e8d3722bf47bd62ba7b0a44f4e4d971f6637a5cb9.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral2
Sample
69860e0dd760e72af45ce75e8d3722bf47bd62ba7b0a44f4e4d971f6637a5cb9.exe
Resource
win11-20240709-en
General
-
Target
69860e0dd760e72af45ce75e8d3722bf47bd62ba7b0a44f4e4d971f6637a5cb9
-
Size
641KB
-
MD5
22f4574f9c35b2380df0ae3b04dc0f91
-
SHA1
480cd97016d5e0ee31627bc715abdb87a3ee7b6d
-
SHA256
69860e0dd760e72af45ce75e8d3722bf47bd62ba7b0a44f4e4d971f6637a5cb9
-
SHA512
55c1e4894c01a92b73f7df2ca0a67f393ab8dd5212d6fb7269bbc80f8eb1f563bd3bc9354bb1c5e9f0e8d394942be1fc577f1fd64256c3b18918c25e88c48279
-
SSDEEP
12288:3Ed7JISCzFpE1pb0D/AG4fUSPHUuDLFx:8ItaPIDT0HjDLFx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 69860e0dd760e72af45ce75e8d3722bf47bd62ba7b0a44f4e4d971f6637a5cb9
Files
-
69860e0dd760e72af45ce75e8d3722bf47bd62ba7b0a44f4e4d971f6637a5cb9.exe windows:5 windows x86 arch:x86
c748c52d7377f46a72152e843a229a3f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapCompact
SetEndOfFile
LocalCompact
CreateHardLinkA
GlobalAlloc
LoadLibraryW
ReadConsoleInputA
IsBadWritePtr
GlobalUnlock
GetLastError
SetLastError
GetProcAddress
IsBadHugeWritePtr
CreateJobSet
VerLanguageNameW
LoadLibraryA
SetConsoleCtrlHandler
AddAtomW
CreateEventW
HeapWalk
EnumResourceTypesW
GetModuleFileNameA
GetOEMCP
EnumResourceNamesA
GetCurrentDirectoryA
GetFileTime
GetCurrentThreadId
Module32NextW
GetDiskFreeSpaceExW
TerminateJobObject
CreateFileW
WriteConsoleW
CloseHandle
FlushFileBuffers
GetConsoleMode
GetConsoleCP
GetStringTypeW
HeapAlloc
GetCommandLineW
HeapSetInformation
GetStartupInfoW
RaiseException
IsProcessorFeaturePresent
GetModuleHandleW
ExitProcess
DecodePointer
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
TerminateProcess
GetCurrentProcess
HeapFree
WriteFile
GetStdHandle
GetModuleFileNameW
HeapCreate
ReadFile
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
InterlockedDecrement
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LeaveCriticalSection
EnterCriticalSection
Sleep
MultiByteToWideChar
SetFilePointer
RtlUnwind
HeapSize
GetCPInfo
GetACP
IsValidCodePage
WideCharToMultiByte
HeapReAlloc
SetStdHandle
LCMapStringW
user32
CharUpperBuffW
LoadMenuA
GetKeyboardLayout
CharUpperBuffA
SetCursorPos
GetSysColorBrush
GetSystemMetrics
SetCaretPos
GetMessageTime
Sections
.text Size: 440KB - Virtual size: 440KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 147KB - Virtual size: 28.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.kowufix Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.divu Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ