Static task
static1
Behavioral task
behavioral1
Sample
ac8c8fb1944db297b82995c4d13648d2d7c3884d59a033c8c14db845597eef6c.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral2
Sample
ac8c8fb1944db297b82995c4d13648d2d7c3884d59a033c8c14db845597eef6c.exe
Resource
win11-20240709-en
General
-
Target
ac8c8fb1944db297b82995c4d13648d2d7c3884d59a033c8c14db845597eef6c
-
Size
227KB
-
MD5
c6a9ab6339f8617d18f8966aa1359f34
-
SHA1
67ffa3bb4d7ef16fb9685702e06c9910a369f74f
-
SHA256
ac8c8fb1944db297b82995c4d13648d2d7c3884d59a033c8c14db845597eef6c
-
SHA512
3df1613df775229d9cfba5863afddf9f427f1eee985274e81f9725e1ca3ec04c6c1f68e5533946a55fcbcc117d7fe5df11aa5ac1e20975ea6ca213c04769a6f8
-
SSDEEP
3072:LCVuay93ub/RkG7Q9UHdwYkPcCdMG/vWN4qQOzL1yzErKpM:Ocay93G/RkG7Q95kCdmCVOlyzErK
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource ac8c8fb1944db297b82995c4d13648d2d7c3884d59a033c8c14db845597eef6c
Files
-
ac8c8fb1944db297b82995c4d13648d2d7c3884d59a033c8c14db845597eef6c.exe windows:5 windows x86 arch:x86
227c2d4ce0274b95ccaadb855c19748d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LocalCompact
EnumCalendarInfoW
SetEnvironmentVariableW
GetTickCount
CreateNamedPipeW
GetConsoleAliasesA
EnumResourceTypesA
GetConsoleCP
GlobalAlloc
SetFileShortNameW
LoadLibraryW
IsProcessInJob
FatalAppExitW
AssignProcessToJobObject
IsBadCodePtr
ReplaceFileW
GetModuleFileNameW
GetSystemDirectoryA
CreateFileW
GlobalUnlock
CreateJobObjectA
GetLastError
SetEndOfFile
VerLanguageNameW
LoadLibraryA
SetConsoleCtrlHandler
AddAtomW
HeapWalk
GetOEMCP
EnumDateFormatsA
GetModuleHandleA
GetProcessShutdownParameters
EnumResourceNamesA
GetFileTime
PeekConsoleInputA
GetDiskFreeSpaceExA
LCMapStringW
HeapSize
FlushFileBuffers
GetStringTypeW
WriteConsoleInputW
FindVolumeClose
GetProcAddress
HeapCompact
WriteConsoleW
HeapReAlloc
GetCommandLineW
HeapSetInformation
GetStartupInfoW
DecodePointer
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
TerminateProcess
GetCurrentProcess
HeapAlloc
HeapFree
EnterCriticalSection
LeaveCriticalSection
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
MultiByteToWideChar
ReadFile
GetModuleHandleW
ExitProcess
SetFilePointer
HeapCreate
WriteFile
FreeEnvironmentStringsW
GetEnvironmentStringsW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
WideCharToMultiByte
GetConsoleMode
GetCPInfo
GetACP
IsValidCodePage
Sleep
RtlUnwind
SetStdHandle
IsProcessorFeaturePresent
CloseHandle
user32
GetMenu
CharUpperBuffW
SetCaretPos
GetMessageExtraInfo
DrawStateW
GetSysColorBrush
gdi32
GetCharWidthI
CreateDCA
GetCharABCWidthsI
winhttp
WinHttpOpen
msimg32
AlphaBlend
Sections
.text Size: 117KB - Virtual size: 116KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 55KB - Virtual size: 32.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.nivaga Size: 1024B - Virtual size: 723B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vuju Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ