Static task
static1
Behavioral task
behavioral1
Sample
0104e5e5ca64c45ec6d1d99e0f4d4bb07092cfefbad28bba8070a343a067c82a.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
0104e5e5ca64c45ec6d1d99e0f4d4bb07092cfefbad28bba8070a343a067c82a.exe
Resource
win11-20240802-en
General
-
Target
0104e5e5ca64c45ec6d1d99e0f4d4bb07092cfefbad28bba8070a343a067c82a
-
Size
415KB
-
MD5
141e63898a3ede2add799381ad1152cc
-
SHA1
8e787eeb585afc8cc2ff96837447dbd78d53f5c1
-
SHA256
0104e5e5ca64c45ec6d1d99e0f4d4bb07092cfefbad28bba8070a343a067c82a
-
SHA512
a8335dacd64bfdf46f618bb10b77c66ae7635748a026091f05c4144f9a3df9b1cd9c4a1bbdfb617996e0f5823380e84c84506147a365e4640251fc3ae04eeec2
-
SSDEEP
6144:CtJZ7S8n/JXJlmqI251ZGOF4Q/W86fwLNTj:CtJ5rn/JXFI25/l266wj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0104e5e5ca64c45ec6d1d99e0f4d4bb07092cfefbad28bba8070a343a067c82a
Files
-
0104e5e5ca64c45ec6d1d99e0f4d4bb07092cfefbad28bba8070a343a067c82a.exe windows:5 windows x86 arch:x86
af5deaa0564866b7cc3f3d81968c6f9b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetConsoleAliasesLengthW
CommConfigDialogA
SetConsoleTextAttribute
SetEnvironmentVariableW
HeapFree
LockFile
GetModuleHandleW
GetTickCount
CreateNamedPipeW
EnumTimeFormatsA
EnumTimeFormatsW
GlobalAlloc
SetFileShortNameW
LoadLibraryW
IsBadCodePtr
SetVolumeMountPointA
SetConsoleCP
GetConsoleAliasW
GetModuleFileNameW
GetSystemDirectoryA
CreateActCtxA
ReplaceFileA
CreateJobObjectA
GetConsoleAliasesW
GetLastError
SetLastError
GetProcAddress
PeekConsoleInputW
GlobalFree
CreateFileA
InterlockedExchangeAdd
CreateFileMappingW
SetConsoleCtrlHandler
GetNumberFormatW
CreateEventW
QueryDosDeviceW
AddAtomA
OpenJobObjectW
FoldStringW
GetOEMCP
GetModuleHandleA
HeapSetInformation
EnumResourceNamesA
RequestWakeupLatency
FatalAppExitA
SetProcessShutdownParameters
GetDiskFreeSpaceExW
GetCurrentProcessId
LCMapStringW
ReadFile
GetProcessHeap
SetEndOfFile
HeapSize
HeapReAlloc
GetStringTypeW
LoadLibraryA
EnumResourceNamesW
MultiByteToWideChar
WriteConsoleW
FlushFileBuffers
CreateFileW
SetStdHandle
HeapAlloc
GetCommandLineW
GetStartupInfoW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
DecodePointer
TerminateProcess
GetCurrentProcess
IsProcessorFeaturePresent
WideCharToMultiByte
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapCreate
ExitProcess
WriteFile
RtlUnwind
SetFilePointer
CloseHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
IsValidCodePage
Sleep
RaiseException
user32
GetComboBoxInfo
SetClipboardViewer
GetCaretPos
CharUpperBuffW
ChangeMenuW
GetMenuState
ChangeMenuA
GetDC
GetSysColorBrush
gdi32
GetCharWidthI
shell32
FindExecutableA
ole32
StringFromIID
CoSuspendClassObjects
winhttp
WinHttpCheckPlatform
Sections
.text Size: 259KB - Virtual size: 258KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 95KB - Virtual size: 36.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vow Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.wexec Size: 1024B - Virtual size: 923B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 52KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ