Static task
static1
Behavioral task
behavioral1
Sample
4f469cd93664be8e80274f3da69a609b9e60fa051e718d83c3199316948f5648.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
4f469cd93664be8e80274f3da69a609b9e60fa051e718d83c3199316948f5648.exe
Resource
win10v2004-20240802-en
General
-
Target
4f469cd93664be8e80274f3da69a609b9e60fa051e718d83c3199316948f5648
-
Size
726KB
-
MD5
8c538eab41e78379704df2ec3bd4cd33
-
SHA1
53459c4f981386cbed7508e3e4d9aae2e3290b43
-
SHA256
4f469cd93664be8e80274f3da69a609b9e60fa051e718d83c3199316948f5648
-
SHA512
140bd9cc7c9fb5e80e4db9376cd7232aff1e65336b51ba6b1b2a5374524f8d03390545c24b331418ec9ecf0f6f2ca7a318b4177b4ed1c82b2e2545c7f7cfbc46
-
SSDEEP
12288:DLiER3iSEzLod/RgJ2JdUNRBnW4r3UT9yNbLOYkzNkHshgdUENsu/:DLiUrSEJdUNRBnNC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4f469cd93664be8e80274f3da69a609b9e60fa051e718d83c3199316948f5648
Files
-
4f469cd93664be8e80274f3da69a609b9e60fa051e718d83c3199316948f5648.exe windows:6 windows x64 arch:x64
12abb772b36807a1fcacf6bd30f25c17
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
ntdll
RtlPcToFileHeader
RtlUnwindEx
TpAllocJobNotification
NtQueryObject
RtlNtStatusToDosError
NtQueryInformationProcess
winhttp
WinHttpCrackUrl
kernel32
HeapSize
ReadConsoleW
WriteConsoleW
SetStdHandle
FindNextFileW
FindFirstFileExW
FindClose
GetCommandLineW
GetCommandLineA
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCurrentProcess
GetSystemFirmwareTable
SizeofResource
Process32First
WriteFile
FindResourceA
GetModuleHandleA
CreateToolhelp32Snapshot
CreateFileA
LoadLibraryA
LockResource
Process32Next
CloseHandle
LoadLibraryW
LoadResource
SearchPathA
GetProcAddress
FreeLibrary
IsDebuggerPresent
GetLastError
LocalFree
FormatMessageA
SetInformationJobObject
WriteProcessMemory
AssignProcessToJobObject
CreateJobObjectW
CreateFileW
DuplicateHandle
OpenProcess
CreateEventW
SetEvent
VirtualAllocEx
WideCharToMultiByte
WaitForSingleObjectEx
Sleep
GetCurrentThread
GetCurrentThreadId
QueryPerformanceCounter
MultiByteToWideChar
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
EncodePointer
DecodePointer
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetModuleHandleW
CompareStringW
LCMapStringW
GetLocaleInfoW
GetStringTypeW
GetCPInfo
ResetEvent
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
GetStartupInfoW
GetCurrentProcessId
InitializeSListHead
GetThreadTimes
GetModuleFileNameW
LoadLibraryExW
GetOEMCP
IsValidCodePage
RaiseException
ExitProcess
GetModuleHandleExW
HeapAlloc
HeapReAlloc
HeapFree
GetStdHandle
GetACP
GetDateFormatW
GetTimeFormatW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetTimeZoneInformation
GetFileType
FlushFileBuffers
GetConsoleCP
GetConsoleMode
ReadFile
SetFilePointerEx
GetProcessHeap
advapi32
SystemFunction036
Sections
.text Size: 356KB - Virtual size: 356KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 136KB - Virtual size: 135KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 200KB - Virtual size: 200KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ