Static task
static1
Behavioral task
behavioral1
Sample
d0d022488b46b06980b4f29ced411e1cc80ffc1071f0f9c6cc4b80abf611c140.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
d0d022488b46b06980b4f29ced411e1cc80ffc1071f0f9c6cc4b80abf611c140.exe
Resource
win10v2004-20240802-en
General
-
Target
d0d022488b46b06980b4f29ced411e1cc80ffc1071f0f9c6cc4b80abf611c140
-
Size
317KB
-
MD5
0bc7e775dcd06a169ba3639a5fc6a0c9
-
SHA1
b6e5aed8c3512cd4a8f4cfc2830c2881129ca9a0
-
SHA256
d0d022488b46b06980b4f29ced411e1cc80ffc1071f0f9c6cc4b80abf611c140
-
SHA512
51bb00461a0510fb6e5e84638cee907eaf07689626dfa5c87d88269d5276d37d22d6f2f456431a9bc2f51e7273eea1f4f50c440441752f81cd67e41e0789b4d4
-
SSDEEP
3072:OGFkuLPs4xnWfRiO7SBwe87I6fkqIoVX8lAhEO5VqCRuLdTgCRVhqin9RTT:KOPBQRi4AweUvrIoVsshSn5MghL3T
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d0d022488b46b06980b4f29ced411e1cc80ffc1071f0f9c6cc4b80abf611c140
Files
-
d0d022488b46b06980b4f29ced411e1cc80ffc1071f0f9c6cc4b80abf611c140.exe windows:5 windows x86 arch:x86
42b9ff7c49af3020989d2bd49c20164f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateNamedPipeW
GetConsoleAliasesA
EnumTimeFormatsA
GetConsoleCP
GlobalAlloc
GetSystemDirectoryW
SetFileShortNameW
LoadLibraryW
CreateEventA
GetConsoleAliasW
HeapValidate
GetModuleFileNameW
ReplaceFileA
LCMapStringA
GetLastError
SetLastError
GetProcAddress
FindVolumeMountPointClose
PeekConsoleInputW
IsBadHugeWritePtr
CreateJobSet
GlobalFree
LoadLibraryA
InterlockedExchangeAdd
CreateFileMappingA
GetTickCount
GetNumberFormatW
AddAtomW
QueryDosDeviceW
HeapWalk
FoldStringA
SetEnvironmentVariableA
GetOEMCP
GetModuleHandleA
GetProcessShutdownParameters
RequestWakeupLatency
EnumDateFormatsW
FatalAppExitA
GetDiskFreeSpaceExA
GetCurrentProcessId
GetProcessHeap
SetEndOfFile
GetStringTypeW
LCMapStringW
MultiByteToWideChar
WriteConsoleW
CreateJobObjectW
CommConfigDialogA
GetConsoleAliasesLengthW
CreateFileA
SetConsoleCtrlHandler
EnumResourceNamesW
HeapSize
FlushFileBuffers
CreateFileW
SetStdHandle
HeapReAlloc
GetCommandLineA
HeapSetInformation
GetStartupInfoW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
DecodePointer
TerminateProcess
GetCurrentProcess
HeapAlloc
HeapFree
IsProcessorFeaturePresent
EnterCriticalSection
LeaveCriticalSection
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
RtlUnwind
SetFilePointer
HeapCreate
CloseHandle
RaiseException
GetModuleHandleW
ExitProcess
WriteFile
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
QueryPerformanceCounter
GetSystemTimeAsFileTime
Sleep
GetConsoleMode
GetCPInfo
GetACP
IsValidCodePage
ReadFile
user32
GetSysColorBrush
GetComboBoxInfo
SetClipboardViewer
GetDC
ChangeMenuA
GetMenuState
DrawStateA
CharUpperBuffA
GetCaretPos
gdi32
GetCharWidthI
CreateDCA
CreateDCW
GetCharWidthA
GetCharWidthW
shell32
FindExecutableA
ole32
StringFromIID
CoSuspendClassObjects
winhttp
WinHttpCheckPlatform
Sections
.text Size: 172KB - Virtual size: 172KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 95KB - Virtual size: 36.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gote Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.jewevit Size: 1024B - Virtual size: 723B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.cupuk Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ