Static task
static1
Behavioral task
behavioral1
Sample
7e12a4c77fc3b56d0a971f9ec6aad4cf258b0d1ad79933f48d54b05635d5e2a3.exe
Resource
win10v2004-20240709-en
General
-
Target
7e12a4c77fc3b56d0a971f9ec6aad4cf258b0d1ad79933f48d54b05635d5e2a3
-
Size
251KB
-
MD5
b68e2aa65e55625f6642f8a22257c63b
-
SHA1
4fc890af9585d369fd169941cab64af1cfac4f89
-
SHA256
7e12a4c77fc3b56d0a971f9ec6aad4cf258b0d1ad79933f48d54b05635d5e2a3
-
SHA512
52951129eada7b705b486991cf4375cf15c61990bc5d3f80e69d2a71877d44b0e93a0afeb4742fbcd5e549e67f2c645b6a6c448c02fcb11fb1a699d48be66c2b
-
SSDEEP
3072:uLCWSJzpVn5jzA8WSfMGz5qW7FEFookf1hdjNoiMrFayrhA4rtF9VLU0TP:NjJzb5jb7UCT7FEFooqjvMEO53jL7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7e12a4c77fc3b56d0a971f9ec6aad4cf258b0d1ad79933f48d54b05635d5e2a3
Files
-
7e12a4c77fc3b56d0a971f9ec6aad4cf258b0d1ad79933f48d54b05635d5e2a3.exe windows:5 windows x86 arch:x86
74a4a02fbd9b245d3cfc1091756049ca
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetEndOfFile
LocalCompact
SetEnvironmentVariableW
GetTickCount
CreateNamedPipeW
GetConsoleAliasesA
EnumResourceTypesA
GetConsoleCP
GlobalAlloc
SetFileShortNameW
LoadLibraryW
IsProcessInJob
FatalAppExitW
AssignProcessToJobObject
IsBadCodePtr
ReplaceFileW
GetModuleFileNameW
GetSystemDirectoryA
CreateFileW
GlobalUnlock
CreateJobObjectA
GetLastError
WriteConsoleInputW
VerLanguageNameW
LoadLibraryA
SetConsoleCtrlHandler
AddAtomW
HeapWalk
GetOEMCP
EnumDateFormatsA
GetModuleHandleA
GetProcessShutdownParameters
EnumResourceNamesA
GetFileTime
PeekConsoleInputA
GetDiskFreeSpaceExA
LCMapStringW
HeapSize
FlushFileBuffers
GetStringTypeW
FindVolumeClose
GetProcAddress
HeapCompact
WriteConsoleW
HeapReAlloc
GetCommandLineW
HeapSetInformation
GetStartupInfoW
DecodePointer
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
TerminateProcess
GetCurrentProcess
HeapAlloc
HeapFree
EnterCriticalSection
LeaveCriticalSection
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
MultiByteToWideChar
ReadFile
GetModuleHandleW
ExitProcess
SetFilePointer
HeapCreate
WriteFile
FreeEnvironmentStringsW
GetEnvironmentStringsW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
WideCharToMultiByte
GetConsoleMode
GetCPInfo
GetACP
IsValidCodePage
Sleep
RtlUnwind
SetStdHandle
IsProcessorFeaturePresent
CloseHandle
user32
GetMenu
CharUpperBuffW
SetCaretPos
GetMessageExtraInfo
DrawStateW
GetSysColorBrush
gdi32
GetCharWidthI
GetCharABCWidthsI
winhttp
WinHttpOpen
msimg32
AlphaBlend
Sections
.text Size: 134KB - Virtual size: 134KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 55KB - Virtual size: 32.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sosituf Size: 1024B - Virtual size: 723B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tepos Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 46KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ