Static task
static1
Behavioral task
behavioral1
Sample
215857da6107e7c3d27d9799112f1cff9fe68f9897600f47daa5ace52b3c09c2.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
215857da6107e7c3d27d9799112f1cff9fe68f9897600f47daa5ace52b3c09c2.exe
Resource
win10v2004-20240730-en
General
-
Target
215857da6107e7c3d27d9799112f1cff9fe68f9897600f47daa5ace52b3c09c2.exe
-
Size
271KB
-
MD5
3825fcb7244f5e4a2e3d232da4c87a5d
-
SHA1
5c19f31f4f97f7781375d30fcb9a4a79823b47fc
-
SHA256
215857da6107e7c3d27d9799112f1cff9fe68f9897600f47daa5ace52b3c09c2
-
SHA512
b268664d60ebe945fc7dc85f30d4a15050ae656387b0481bbf874260645c53dcce40168b6d6dfdf7b2fe894a3611886ff4272888d07826d913f4cb219903aa1b
-
SSDEEP
6144:gBdApReUlX3/tgwelTIaZh13jTN8ia/dHr3BFA+EP:gBaRpln/tgThC/dHL5EP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 215857da6107e7c3d27d9799112f1cff9fe68f9897600f47daa5ace52b3c09c2.exe
Files
-
215857da6107e7c3d27d9799112f1cff9fe68f9897600f47daa5ace52b3c09c2.exe.exe windows:5 windows x64 arch:x64
cb2d00b7872d8eee2cba43d2e1793c42
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
Sleep
GetFileAttributesW
GetModuleFileNameW
MoveFileExW
SetEndOfFile
CreateFileW
CreateProcessW
CloseHandle
ExitProcess
CreateFileA
WriteConsoleW
SetStdHandle
LoadLibraryW
FreeLibrary
SetConsoleCtrlHandler
HeapReAlloc
IsValidLocale
EnumSystemLocalesA
WideCharToMultiByte
GetStringTypeW
MultiByteToWideChar
EncodePointer
DecodePointer
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetLastError
HeapFree
GetCommandLineW
GetStartupInfoW
RaiseException
RtlPcToFileHeader
RtlLookupFunctionEntry
RtlUnwindEx
GetCPInfo
HeapAlloc
LCMapStringW
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlCaptureContext
TerminateProcess
GetCurrentProcess
GetACP
GetOEMCP
IsValidCodePage
FlsGetValue
FlsSetValue
FlsFree
SetLastError
GetCurrentThreadId
GetCurrentThread
FlsAlloc
HeapSetInformation
GetVersion
HeapCreate
HeapDestroy
GetProcAddress
GetModuleHandleW
FatalAppExitA
ReadFile
SetFilePointer
WriteFile
GetConsoleCP
GetConsoleMode
FlushFileBuffers
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetLocaleInfoW
HeapSize
GetUserDefaultLCID
GetLocaleInfoA
GetProcessHeap
user32
MessageBoxW
advapi32
RegOpenKeyExW
RegCloseKey
shell32
SHGetKnownFolderPath
ole32
CoTaskMemFree
wininet
InternetReadFile
InternetCloseHandle
InternetOpenUrlW
InternetOpenW
Sections
.text Size: 170KB - Virtual size: 169KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 55KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rsrc Size: 22KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ