Static task
static1
Behavioral task
behavioral1
Sample
336a558f5238472862f03ffc952355e19c63ad3e7fcc23bce807d4d2e47455e3.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral2
Sample
336a558f5238472862f03ffc952355e19c63ad3e7fcc23bce807d4d2e47455e3.exe
Resource
win11-20240709-en
General
-
Target
336a558f5238472862f03ffc952355e19c63ad3e7fcc23bce807d4d2e47455e3
-
Size
341KB
-
MD5
83f3e3fc114bd54c14e19c32b17f496d
-
SHA1
d8049be7d00ba40fc15db9a829ff8e031449ea33
-
SHA256
336a558f5238472862f03ffc952355e19c63ad3e7fcc23bce807d4d2e47455e3
-
SHA512
9809abbcdf850b615348268af5f43535e490e48678ab8f4b9b338ebd6bc8424e4340b914669f4965a4f51f1888c97e2fa59a4dea5ec9674603e12b8ec1a77666
-
SSDEEP
3072:GfQF3/4CJT/se0sk0uFn5xZoFPuD6/xe9dxJ3TMl:GfQxgCJn0swFn5x6sCmJ3T
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 336a558f5238472862f03ffc952355e19c63ad3e7fcc23bce807d4d2e47455e3
Files
-
336a558f5238472862f03ffc952355e19c63ad3e7fcc23bce807d4d2e47455e3.exe windows:5 windows x86 arch:x86
c748c52d7377f46a72152e843a229a3f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapCompact
SetEndOfFile
LocalCompact
CreateHardLinkA
GlobalAlloc
LoadLibraryW
ReadConsoleInputA
IsBadWritePtr
GlobalUnlock
GetLastError
SetLastError
GetProcAddress
IsBadHugeWritePtr
CreateJobSet
VerLanguageNameW
LoadLibraryA
SetConsoleCtrlHandler
AddAtomW
CreateEventW
HeapWalk
EnumResourceTypesW
GetModuleFileNameA
GetOEMCP
EnumResourceNamesA
GetCurrentDirectoryA
GetFileTime
GetCurrentThreadId
Module32NextW
GetDiskFreeSpaceExW
TerminateJobObject
CreateFileW
WriteConsoleW
CloseHandle
FlushFileBuffers
GetConsoleMode
GetConsoleCP
GetStringTypeW
HeapAlloc
GetCommandLineW
HeapSetInformation
GetStartupInfoW
RaiseException
IsProcessorFeaturePresent
GetModuleHandleW
ExitProcess
DecodePointer
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
TerminateProcess
GetCurrentProcess
HeapFree
WriteFile
GetStdHandle
GetModuleFileNameW
HeapCreate
ReadFile
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
InterlockedDecrement
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LeaveCriticalSection
EnterCriticalSection
Sleep
MultiByteToWideChar
SetFilePointer
RtlUnwind
HeapSize
GetCPInfo
GetACP
IsValidCodePage
WideCharToMultiByte
HeapReAlloc
SetStdHandle
LCMapStringW
user32
CharUpperBuffW
LoadMenuA
GetKeyboardLayout
CharUpperBuffA
SetCursorPos
GetSysColorBrush
GetSystemMetrics
SetCaretPos
GetMessageTime
Sections
.text Size: 140KB - Virtual size: 139KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 147KB - Virtual size: 28.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rofi Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bev Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ