Static task
static1
Behavioral task
behavioral1
Sample
a5f35b4f8933e0106c7743eaadbd3b883f61552add7ff17aca237450b3aa4168.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a5f35b4f8933e0106c7743eaadbd3b883f61552add7ff17aca237450b3aa4168.exe
Resource
win10v2004-20240709-en
General
-
Target
a5f35b4f8933e0106c7743eaadbd3b883f61552add7ff17aca237450b3aa4168.exe
-
Size
268KB
-
MD5
6c2830c79d0a840f479ad635e3d57883
-
SHA1
dc4073381a79705a4df53048cad7b44679623835
-
SHA256
a5f35b4f8933e0106c7743eaadbd3b883f61552add7ff17aca237450b3aa4168
-
SHA512
0a17899c829495dddf3d08a832c7e2b4747ab9665089a9d6b8d5bb625e4851e885800cb242241740853f9e5ad30449f710edd231865c49d464a7aa3084aedc91
-
SSDEEP
3072:66kSFokrBF+7cvxpl1oZkNYe/v4IMbGhULweRQvybL2RxTTu:jzfrK+Dl1ou2HtmaLgxTT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a5f35b4f8933e0106c7743eaadbd3b883f61552add7ff17aca237450b3aa4168.exe
Files
-
a5f35b4f8933e0106c7743eaadbd3b883f61552add7ff17aca237450b3aa4168.exe.exe windows:5 windows x86 arch:x86
3ee3964629fff7decd6eee12d8b20149
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetEndOfFile
LocalCompact
GlobalLock
CreateHardLinkA
GetModuleHandleW
CreateNamedPipeW
GetProcessHeap
GetConsoleCP
GlobalAlloc
GetSystemDirectoryW
LoadLibraryW
IsProcessInJob
AssignProcessToJobObject
CreateEventA
CreateJobObjectA
GetConsoleAliasesW
GetLastError
SetLastError
GetProcAddress
PeekConsoleInputW
EnumDateFormatsExA
VerLanguageNameW
IsBadHugeReadPtr
SetConsoleCtrlHandler
AddAtomW
HeapWalk
EnumResourceTypesW
SetEnvironmentVariableA
GetModuleFileNameA
GetOEMCP
EnumResourceNamesA
GetFileTime
FatalAppExitA
SetProcessShutdownParameters
SetFileShortNameA
GetDiskFreeSpaceExA
LCMapStringW
CreateFileW
CloseHandle
WriteConsoleW
FlushFileBuffers
HeapReAlloc
FindFirstVolumeMountPointW
CreateFileA
HeapFree
HeapAlloc
GetCommandLineA
HeapSetInformation
GetStartupInfoW
RaiseException
IsProcessorFeaturePresent
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
IsValidCodePage
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
DecodePointer
TlsFree
GetCurrentThreadId
HeapCreate
EnterCriticalSection
LeaveCriticalSection
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
ExitProcess
WriteFile
GetModuleFileNameW
ReadFile
MultiByteToWideChar
SetFilePointer
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetStringTypeW
Sleep
GetConsoleMode
RtlUnwind
SetStdHandle
HeapSize
user32
CharUpperBuffW
GetMessageExtraInfo
DrawStateW
SetMenu
GetSysColorBrush
SetCaretPos
SetClipboardViewer
advapi32
RegSetValueA
Sections
.text Size: 174KB - Virtual size: 173KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 46KB - Virtual size: 32.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 33KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ