Static task
static1
Behavioral task
behavioral1
Sample
3eace1ea20a0d1280a41313cb0341e659b08ba80f8b94155c335286543432606.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral2
Sample
3eace1ea20a0d1280a41313cb0341e659b08ba80f8b94155c335286543432606.exe
Resource
win11-20240709-en
General
-
Target
3eace1ea20a0d1280a41313cb0341e659b08ba80f8b94155c335286543432606
-
Size
536KB
-
MD5
076d1f253731e2f08782942d5593c0d4
-
SHA1
850dafeb17bf8daf72cb495ed2d80d85d6477c40
-
SHA256
3eace1ea20a0d1280a41313cb0341e659b08ba80f8b94155c335286543432606
-
SHA512
fd526e47c97abe7c30568d82ab30aafa36adc8e63724a7e066135f490cff54b2f8a940f698259afc6110f4d2c38e7c0e2271841ad7a7eb951d5fb92d6e6466e7
-
SSDEEP
12288:a+5ProzgXyz0xbHRspVaJVqredO+CDcQsU9V:HtosyzuRzYedO/VV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3eace1ea20a0d1280a41313cb0341e659b08ba80f8b94155c335286543432606
Files
-
3eace1ea20a0d1280a41313cb0341e659b08ba80f8b94155c335286543432606.exe windows:5 windows x86 arch:x86
74a4a02fbd9b245d3cfc1091756049ca
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetEndOfFile
LocalCompact
SetEnvironmentVariableW
GetTickCount
CreateNamedPipeW
GetConsoleAliasesA
EnumResourceTypesA
GetConsoleCP
GlobalAlloc
SetFileShortNameW
LoadLibraryW
IsProcessInJob
FatalAppExitW
AssignProcessToJobObject
IsBadCodePtr
ReplaceFileW
GetModuleFileNameW
GetSystemDirectoryA
CreateFileW
GlobalUnlock
CreateJobObjectA
GetLastError
WriteConsoleInputW
VerLanguageNameW
LoadLibraryA
SetConsoleCtrlHandler
AddAtomW
HeapWalk
GetOEMCP
EnumDateFormatsA
GetModuleHandleA
GetProcessShutdownParameters
EnumResourceNamesA
GetFileTime
PeekConsoleInputA
GetDiskFreeSpaceExA
LCMapStringW
HeapSize
FlushFileBuffers
GetStringTypeW
FindVolumeClose
GetProcAddress
HeapCompact
WriteConsoleW
HeapReAlloc
GetCommandLineW
HeapSetInformation
GetStartupInfoW
DecodePointer
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
TerminateProcess
GetCurrentProcess
HeapAlloc
HeapFree
EnterCriticalSection
LeaveCriticalSection
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
MultiByteToWideChar
ReadFile
GetModuleHandleW
ExitProcess
SetFilePointer
HeapCreate
WriteFile
FreeEnvironmentStringsW
GetEnvironmentStringsW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
WideCharToMultiByte
GetConsoleMode
GetCPInfo
GetACP
IsValidCodePage
Sleep
RtlUnwind
SetStdHandle
IsProcessorFeaturePresent
CloseHandle
user32
GetMenu
CharUpperBuffW
SetCaretPos
GetMessageExtraInfo
DrawStateW
GetSysColorBrush
gdi32
GetCharWidthI
GetCharABCWidthsI
winhttp
WinHttpOpen
msimg32
AlphaBlend
Sections
.text Size: 419KB - Virtual size: 418KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 55KB - Virtual size: 32.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.buz Size: 1024B - Virtual size: 723B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.fevimi Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 46KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ