Static task
static1
Behavioral task
behavioral1
Sample
19f17c78dffb74e7acc35cf715689b8157b04b833e522b427b7eda1cc7324696.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
19f17c78dffb74e7acc35cf715689b8157b04b833e522b427b7eda1cc7324696.exe
Resource
win10v2004-20240709-en
General
-
Target
19f17c78dffb74e7acc35cf715689b8157b04b833e522b427b7eda1cc7324696
-
Size
691KB
-
MD5
d26082c8ae68b4c546843f32325c01dd
-
SHA1
32dbba008b93a3c2f8fc8fadccf7d5c7ab096f87
-
SHA256
19f17c78dffb74e7acc35cf715689b8157b04b833e522b427b7eda1cc7324696
-
SHA512
2a1656d8c2cf6991780b0665a6815b58eaa31e1584fa6154207b540c5294e0c4848516d7f4717b6cf2fb70edf3ff9ca5f256035ab24eab88417396db80aadaec
-
SSDEEP
12288:SYJsO0qghZwfnpR+yUAg0BOCtK8V/zKbvDDVKu05dHY30hldLZGUh1U:PAZwfnpXUgOOK+mbvNKd8oldLZn
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 19f17c78dffb74e7acc35cf715689b8157b04b833e522b427b7eda1cc7324696
Files
-
19f17c78dffb74e7acc35cf715689b8157b04b833e522b427b7eda1cc7324696.exe windows:5 windows x86 arch:x86
577cbe757b347b671ef5051698a43c54
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ZombifyActCtx
GetCommProperties
GetModuleHandleW
GetConsoleAliasesA
GlobalAlloc
LoadLibraryW
Sleep
SetVolumeMountPointA
WriteConsoleW
GetAtomNameW
WritePrivateProfileStringW
GetShortPathNameA
CreateJobObjectA
InterlockedExchange
SetLastError
GetProcAddress
BuildCommDCBW
LoadLibraryA
UnhandledExceptionFilter
AddAtomA
OpenJobObjectW
FoldStringA
EnumDateFormatsA
lstrcatW
FindFirstVolumeW
AreFileApisANSI
FlushFileBuffers
CloseHandle
CreateFileA
GetLastError
HeapFree
MultiByteToWideChar
HeapReAlloc
HeapAlloc
GetStartupInfoW
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapCreate
VirtualFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
SetFilePointer
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
InitializeCriticalSectionAndSpinCount
RtlUnwind
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
HeapSize
user32
GetProcessDefaultLayout
ole32
CoTaskMemAlloc
Sections
.text Size: 620KB - Virtual size: 620KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 565KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.cawa Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.labuj Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ