Static task
static1
Behavioral task
behavioral1
Sample
f83abe3d9717238755f1276c87b3b320d8c30421984a897099ce3741d9143906.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f83abe3d9717238755f1276c87b3b320d8c30421984a897099ce3741d9143906.exe
Resource
win10v2004-20240709-en
General
-
Target
f83abe3d9717238755f1276c87b3b320d8c30421984a897099ce3741d9143906
-
Size
316KB
-
MD5
1b4e4c1d6a4c1b77672f850efe898561
-
SHA1
873a96342cf300490a0620d1a911fc094ce9c757
-
SHA256
f83abe3d9717238755f1276c87b3b320d8c30421984a897099ce3741d9143906
-
SHA512
e0ec773f19ca0e42691a936ec318e2bb5bf56de318059e318214fa2c8f31df7503ace4382d9f240adc3d67bc345fda8bb4ce4187586a8818f9c2f81e588de997
-
SSDEEP
6144:+oylDAybjYp/76x9pk/90zw9TTfdU0DB6T:16Dk6xXs900dB6T
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f83abe3d9717238755f1276c87b3b320d8c30421984a897099ce3741d9143906
Files
-
f83abe3d9717238755f1276c87b3b320d8c30421984a897099ce3741d9143906.exe windows:4 windows x64 arch:x64
146315d8e514b064211d48602cf77a72
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
Imports
bcrypt
BCryptCloseAlgorithmProvider
BCryptGenRandom
BCryptOpenAlgorithmProvider
kernel32
CloseHandle
CreateEventW
CreateThread
DeleteCriticalSection
EnterCriticalSection
ExitThread
GetCommandLineA
GetCurrentProcess
GetLastError
GetModuleHandleW
GetProcAddress
GetProcessHeap
GetThreadContext
GetThreadId
HeapAlloc
HeapFree
InitializeCriticalSection
IsDBCSLeadByteEx
K32EnumProcessModules
K32GetModuleFileNameExA
LeaveCriticalSection
LoadLibraryA
LoadLibraryW
MultiByteToWideChar
QueueUserAPC
RaiseException
RtlCaptureContext
RtlLookupFunctionEntry
RtlUnwindEx
RtlVirtualUnwind
SetEvent
SetLastError
SetUnhandledExceptionFilter
Sleep
TerminateThread
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
TryEnterCriticalSection
VirtualProtect
VirtualQuery
WaitForSingleObject
WideCharToMultiByte
__C_specific_handler
msvcrt
___lc_codepage_func
___mb_cur_max_func
__getmainargs
__initenv
__iob_func
__set_app_type
__setusermatherr
_amsg_exit
_cexit
_commode
_errno
_exit
_fmode
_initterm
_lock
_onexit
_read
_strnicmp
_unlock
abort
calloc
exit
fprintf
fputc
fputs
free
fwrite
getenv
localeconv
malloc
memchr
memcmp
memcpy
memmove
memset
realloc
signal
strchr
strcmp
strcpy
strerror
strlen
strncmp
strncpy
strtoul
towlower
vfprintf
wcslen
shell32
CommandLineToArgvW
Sections
.text Size: 231KB - Virtual size: 230KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 544B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 39KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pdata Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xdata Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 3KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 96B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 1008B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ