Static task
static1
Behavioral task
behavioral1
Sample
1b11b03ae5de0336692b10083b6076a1c01737469f8ce497490fb8fb5aae8ca4.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
1b11b03ae5de0336692b10083b6076a1c01737469f8ce497490fb8fb5aae8ca4.exe
Resource
win10v2004-20240730-en
General
-
Target
1b11b03ae5de0336692b10083b6076a1c01737469f8ce497490fb8fb5aae8ca4.exe
-
Size
10.2MB
-
MD5
a87b464667e67dd226e8ae5e9dc00ba0
-
SHA1
b434b6aadf8da0e1e0a5e116dd3b95e05f53afd2
-
SHA256
1b11b03ae5de0336692b10083b6076a1c01737469f8ce497490fb8fb5aae8ca4
-
SHA512
ffbc9eb6fd13e9cc989e47f0c653b2d62aab7b89eb39b303fc7ad4ff4ee7daaef515fa0bac0fcd9d02580a7c40d320d98534d959a8c406c957dd5555351171f4
-
SSDEEP
6144:bpCWGX2QsB00PAGhR3XCZTQZnXexeYRujfKI/4a4EOy62Q/h5UF:bEWGX2QsB00PAGyeIexZUn38
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1b11b03ae5de0336692b10083b6076a1c01737469f8ce497490fb8fb5aae8ca4.exe
Files
-
1b11b03ae5de0336692b10083b6076a1c01737469f8ce497490fb8fb5aae8ca4.exe.exe windows:6 windows x64 arch:x64
fcb89c3a49fcced19a01d3f91adfa2b3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
dbghelp
StackWalk64
SymInitialize
SymGetModuleBase64
MiniDumpWriteDump
SymCleanup
SymGetModuleInfo64
SymFunctionTableAccess64
crypt32
CryptBinaryToStringW
wininet
InternetReadFile
InternetQueryDataAvailable
HttpSendRequestW
InternetCrackUrlW
InternetConnectW
InternetOpenW
InternetCheckConnectionW
InternetAttemptConnect
InternetCloseHandle
HttpOpenRequestW
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
shlwapi
PathFileExistsW
kernel32
GetPrivateProfileStringW
GetTempPathW
GetPrivateProfileIntW
GetCurrentDirectoryA
GetPrivateProfileStringA
GetTickCount
Sleep
GetUserPreferredUILanguages
GetModuleHandleW
GetProcAddress
GetModuleHandleA
FindFirstFileW
CompareFileTime
FindNextFileW
FindClose
GetSystemDirectoryA
LoadLibraryA
OpenProcess
CreateEventW
WaitForMultipleObjects
CreateFileW
ReadFile
OutputDebugStringA
GetFileSize
CloseHandle
OpenThread
SetEvent
GetSystemDirectoryW
CreateProcessW
WaitForSingleObject
SetCurrentDirectoryW
CopyFileW
GetStartupInfoW
TlsFree
GetCurrentDirectoryW
TlsGetValue
TlsAlloc
TerminateProcess
GetCurrentProcess
InitializeCriticalSectionAndSpinCount
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlCaptureContext
GetConsoleMode
GetConsoleCP
GetModuleFileNameW
WriteFile
GetStdHandle
GetProcessHeap
GetStringTypeW
GetCPInfo
GetOEMCP
IsValidCodePage
GetCurrentThreadId
SetLastError
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetACP
HeapSize
GetModuleHandleExW
ExitProcess
RtlUnwindEx
RtlLookupFunctionEntry
RtlPcToFileHeader
GetCommandLineW
IsProcessorFeaturePresent
IsDebuggerPresent
MultiByteToWideChar
GetLastError
ReadConsoleW
WideCharToMultiByte
GetFileType
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
LoadLibraryExW
HeapReAlloc
LCMapStringW
SetFilePointerEx
OutputDebugStringW
SetStdHandle
WriteConsoleW
FlushFileBuffers
SetEndOfFile
TlsSetValue
HeapAlloc
CreateDirectoryW
HeapFree
DecodePointer
EncodePointer
LoadLibraryExA
FreeLibrary
VirtualAlloc
user32
SetPropW
SetFocus
wsprintfW
DispatchMessageW
TranslateMessage
GetMessageW
LoadIconW
AdjustWindowRectEx
GetMonitorInfoW
MonitorFromWindow
FillRect
GetSysColor
SetPropA
DestroyWindow
GetWindowTextW
CreateWindowExW
SetWindowTextW
ShowWindow
SetWindowLongPtrW
CreateWindowExA
LoadImageA
EndPaint
BeginPaint
GetPropA
ReleaseDC
DrawTextW
GetClientRect
GetDC
GetFocus
GetWindowTextLengthW
CallWindowProcW
IsWindowVisible
GetWindow
GetKeyState
GetParent
IsWindow
GetPropW
InvalidateRect
SendMessageW
gdi32
GetDeviceCaps
LineTo
MoveToEx
DeleteDC
BitBlt
CreateCompatibleDC
GetObjectW
SetDCBrushColor
SetDCPenColor
CreateFontW
GetStockObject
SelectObject
SetBkMode
SetTextColor
SetBkColor
advapi32
RegCreateKeyA
RegOpenKeyA
RegDeleteValueW
RegSetValueExA
RegQueryValueExA
RegQueryValueExW
RegSetValueExW
RegCloseKey
shell32
ShellExecuteA
SHGetFolderPathW
ole32
CoUninitialize
CoInitialize
CoCreateInstance
Sections
.text Size: 107KB - Virtual size: 106KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 50KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9.9MB - Virtual size: 9.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 160KB - Virtual size: 160KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ