Static task
static1
Behavioral task
behavioral1
Sample
1681639a28f6996f11bac2ee8c8035a7429619fb0deb976ba63f39ce98a35433.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral2
Sample
1681639a28f6996f11bac2ee8c8035a7429619fb0deb976ba63f39ce98a35433.exe
Resource
win11-20240709-en
General
-
Target
1681639a28f6996f11bac2ee8c8035a7429619fb0deb976ba63f39ce98a35433
-
Size
545KB
-
MD5
709dd396d3762fad5f91b08f33064489
-
SHA1
f9a48b5fdb87dcc0db3bf54f70defd8f863327ed
-
SHA256
1681639a28f6996f11bac2ee8c8035a7429619fb0deb976ba63f39ce98a35433
-
SHA512
c7840469e8ab23c520b55fbfe53ed5dfc147f7b9d3459acd6925144c24527d3ad13e0a337191e79548564d5091318299f1cdbcda483eacdb15d1370a285461ad
-
SSDEEP
12288:TDe5O3JH7TRZBPOpaIYNKToOzCSiUt7c8ldvtZXKpSVuo2N/VSaHD:/BJnRZBiYNUQqtl5twpSMo7aj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1681639a28f6996f11bac2ee8c8035a7429619fb0deb976ba63f39ce98a35433
Files
-
1681639a28f6996f11bac2ee8c8035a7429619fb0deb976ba63f39ce98a35433.exe windows:5 windows x86 arch:x86
976b33a49b3619a38b3ab50dd40fd590
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LocalCompact
EnumCalendarInfoW
SetEnvironmentVariableW
GetTickCount
CreateNamedPipeW
GetConsoleAliasesA
EnumResourceTypesA
GetConsoleCP
GlobalAlloc
SetFileShortNameW
LoadLibraryW
IsProcessInJob
FatalAppExitW
AssignProcessToJobObject
IsBadCodePtr
GetModuleFileNameW
GetSystemDirectoryA
ReplaceFileA
GlobalUnlock
CreateJobObjectA
GetLastError
WriteConsoleInputW
VerLanguageNameW
LoadLibraryA
SetConsoleCtrlHandler
AddAtomW
HeapWalk
GetOEMCP
EnumDateFormatsA
GetModuleHandleA
GetProcessShutdownParameters
EnumResourceNamesA
GetFileTime
PeekConsoleInputA
GetDiskFreeSpaceExA
LCMapStringW
HeapSize
GetStringTypeW
WriteConsoleW
FindVolumeClose
HeapCompact
GetProcAddress
CreateFileA
FlushFileBuffers
HeapReAlloc
GetCommandLineW
HeapSetInformation
GetStartupInfoW
DecodePointer
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
TerminateProcess
GetCurrentProcess
HeapAlloc
HeapFree
EnterCriticalSection
LeaveCriticalSection
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
MultiByteToWideChar
ReadFile
GetModuleHandleW
ExitProcess
SetFilePointer
HeapCreate
CloseHandle
WriteFile
FreeEnvironmentStringsW
GetEnvironmentStringsW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
WideCharToMultiByte
GetConsoleMode
GetCPInfo
GetACP
IsValidCodePage
Sleep
RtlUnwind
SetStdHandle
IsProcessorFeaturePresent
CreateFileW
user32
CharUpperBuffA
GetMessageExtraInfo
SetCaretPos
GetMenu
DrawStateW
GetSysColorBrush
gdi32
GetCharWidthI
CreateDCA
GetCharABCWidthsI
winhttp
WinHttpOpen
msimg32
AlphaBlend
Sections
.text Size: 418KB - Virtual size: 418KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 55KB - Virtual size: 32.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.mata Size: 1024B - Virtual size: 723B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vuguyu Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 55KB - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ