Static task
static1
Behavioral task
behavioral1
Sample
78c3b5b7c44de911442b5f3698dd3f90N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
78c3b5b7c44de911442b5f3698dd3f90N.exe
Resource
win10v2004-20240802-en
General
-
Target
78c3b5b7c44de911442b5f3698dd3f90N.exe
-
Size
966KB
-
MD5
78c3b5b7c44de911442b5f3698dd3f90
-
SHA1
3a572534317c108526c049368591d8c723d7fd98
-
SHA256
62e06380f8e5f903d2c084362713d86f8bbe7d12b7cb220211307fb7cc77ce59
-
SHA512
7333501c7e0f4b99e76d2e848e422d6bc8aabaad27133339f6cc631d708e5b8d732a82cd9f55194f79e6b462ffc84b1a3c49f8c2df0b9ba40df4b2204fa38a85
-
SSDEEP
24576:o2nhiT/nVYcEIuF79ynnvh8NT+qY2IWmJrEH7O:BgT/LEvynvh8NThY2IJ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 78c3b5b7c44de911442b5f3698dd3f90N.exe
Files
-
78c3b5b7c44de911442b5f3698dd3f90N.exe.exe windows:6 windows x86 arch:x86
94a97300695bb79dfea1e7c8fe467ff5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetFilePointer
CloseHandle
LoadLibraryA
CreateProcessA
GetTempPathA
CreateFileA
GetModuleHandleA
FindClose
FindFirstFileA
FindNextFileA
Sleep
GetDriveTypeA
GetVolumeInformationA
FindFirstVolumeA
FindNextVolumeA
FindVolumeClose
GlobalMemoryStatus
GetCurrentProcess
GetSystemTime
SystemTimeToFileTime
GetVersionExA
FreeResource
LockResource
DeviceIoControl
LoadResource
SizeofResource
FindResourceA
DeleteFileA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
SetEvent
ResetEvent
WaitForSingleObjectEx
CreateEventW
GetModuleHandleW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
ReadFile
WriteFile
WaitForSingleObject
GetLastError
GetProcAddress
SetLastError
FreeLibrary
RtlUnwind
RaiseException
EncodePointer
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
CreateFileW
GetDriveTypeW
GetFileInformationByHandle
GetFileType
PeekNamedPipe
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
MultiByteToWideChar
SetFilePointerEx
GetDiskFreeSpaceW
GetFullPathNameW
GetFullPathNameA
FindFirstFileExW
FindNextFileW
WideCharToMultiByte
GetStdHandle
GetModuleFileNameA
ExitProcess
GetModuleHandleExW
GetCommandLineA
GetCommandLineW
GetACP
GetConsoleMode
ReadConsoleW
GetConsoleCP
SetEndOfFile
HeapFree
HeapAlloc
GetStringTypeW
CompareStringW
LCMapStringW
FlushFileBuffers
GetCurrentDirectoryW
SetStdHandle
MoveFileExW
HeapReAlloc
GetTimeZoneInformation
FindFirstFileExA
IsValidCodePage
GetOEMCP
GetCPInfo
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
GetProcessHeap
DeleteFileW
CreateDirectoryW
RemoveDirectoryW
HeapSize
WriteConsoleW
DecodePointer
advapi32
RegOpenKeyExA
RegCloseKey
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenProcessToken
RegQueryValueExA
Sections
.text Size: 664KB - Virtual size: 664KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 150KB - Virtual size: 150KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 47KB - Virtual size: 307KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ