Static task
static1
Behavioral task
behavioral1
Sample
64187c157d49176ec8e77ad1133d966ee05905c74ce55fac532c6a0061184380.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral2
Sample
64187c157d49176ec8e77ad1133d966ee05905c74ce55fac532c6a0061184380.exe
Resource
win11-20240709-en
General
-
Target
64187c157d49176ec8e77ad1133d966ee05905c74ce55fac532c6a0061184380
-
Size
749KB
-
MD5
ed6466980b57e9479e511308cc0558f8
-
SHA1
1d2c1f972c759d7e210995014142c552177e476a
-
SHA256
64187c157d49176ec8e77ad1133d966ee05905c74ce55fac532c6a0061184380
-
SHA512
ae44ca614fa9cbf5628c0933926ebf85eae51819417665dfcddaca2c9d74ce67c67086c4f4d869006e78ed8341ca2b1628b0c1e8aa9e642ef47125ae612fa456
-
SSDEEP
12288:P7KcPCq8SmnpgOToGvk/9vUolYvQ332Ha6hyfwyu7iMqQLGlU6s6K9TcXPhy:TKtFxXT16cdY3mBh/pjqOq9xjy
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 64187c157d49176ec8e77ad1133d966ee05905c74ce55fac532c6a0061184380
Files
-
64187c157d49176ec8e77ad1133d966ee05905c74ce55fac532c6a0061184380.exe windows:5 windows x86 arch:x86
ba1dd204733d9e2576cfbf23ab9a279b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapCompact
SetEndOfFile
LocalCompact
CreateHardLinkA
GlobalAlloc
LoadLibraryW
ReadConsoleInputA
IsBadWritePtr
GlobalUnlock
GetLastError
SetLastError
GetProcAddress
IsBadHugeWritePtr
CreateJobSet
VerLanguageNameW
LoadLibraryA
SetConsoleCtrlHandler
AddAtomW
CreateEventW
HeapWalk
EnumResourceTypesW
GetModuleFileNameA
GetOEMCP
EnumResourceNamesA
GetCurrentDirectoryA
GetFileTime
GetCurrentThreadId
Module32NextW
GetDiskFreeSpaceExW
TerminateJobObject
WriteConsoleW
CloseHandle
FlushFileBuffers
GetConsoleMode
GetConsoleCP
SetStdHandle
SetFilePointer
HeapReAlloc
IsValidLocale
WideCharToMultiByte
InterlockedIncrement
InterlockedDecrement
InterlockedCompareExchange
InterlockedExchange
MultiByteToWideChar
GetStringTypeW
EncodePointer
DecodePointer
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapFree
HeapAlloc
GetCommandLineW
HeapSetInformation
GetStartupInfoW
GetCPInfo
RaiseException
RtlUnwind
LCMapStringW
IsProcessorFeaturePresent
GetModuleHandleW
ExitProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
HeapCreate
WriteFile
GetStdHandle
GetModuleFileNameW
ReadFile
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetLocaleInfoW
HeapSize
GetACP
IsValidCodePage
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
CreateFileW
user32
CharUpperBuffW
LoadMenuA
GetKeyboardLayout
CharUpperBuffA
SetCursorPos
GetSysColorBrush
GetSystemMetrics
SetCaretPos
GetMessageTime
Sections
.text Size: 641KB - Virtual size: 641KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 47KB - Virtual size: 28.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.yote Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.dozoh Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ