Static task
static1
Behavioral task
behavioral1
Sample
c7a089b3e6f6b36895ddaa374842ce4dd7ffd06741bf5fddd85e538277368840.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
c7a089b3e6f6b36895ddaa374842ce4dd7ffd06741bf5fddd85e538277368840.exe
Resource
win11-20240802-en
General
-
Target
c7a089b3e6f6b36895ddaa374842ce4dd7ffd06741bf5fddd85e538277368840
-
Size
415KB
-
MD5
144c9c7ad94dee154a1e83239a17c1ff
-
SHA1
23691b6aa9fdacc35b60593342a3822faedd015c
-
SHA256
c7a089b3e6f6b36895ddaa374842ce4dd7ffd06741bf5fddd85e538277368840
-
SHA512
1e2d40dd4111c18afe5e65660babe9c386b52c02ad270ab7d886fd3c411500c8dd60efaa13d89de975d1a92f8b7c26b9b7b3aa82840eb88fa6961ce8881fd36a
-
SSDEEP
12288:yIbbd4FgusKa5hukzcNhDO7qbCWp0wE4:9kaQAc159
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c7a089b3e6f6b36895ddaa374842ce4dd7ffd06741bf5fddd85e538277368840
Files
-
c7a089b3e6f6b36895ddaa374842ce4dd7ffd06741bf5fddd85e538277368840.exe windows:5 windows x86 arch:x86
e12f86c88c10a6fbfc55bcaf7131e9a4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetFilePointer
CommConfigDialogA
SetConsoleTextAttribute
SetEnvironmentVariableW
HeapFree
LockFile
GetModuleHandleW
GetTickCount
CreateNamedPipeW
GetConsoleAliasesLengthA
EnumTimeFormatsA
EnumTimeFormatsW
GlobalAlloc
LoadLibraryW
IsBadCodePtr
SetVolumeMountPointA
SetConsoleCP
GetConsoleAliasW
GetSystemDirectoryA
CreateActCtxA
ReplaceFileA
CreateJobObjectA
GetConsoleAliasesW
GetLastError
SetLastError
GetProcAddress
PeekConsoleInputW
GlobalFree
CreateFileA
InterlockedExchangeAdd
CreateFileMappingW
IsSystemResumeAutomatic
GetNumberFormatW
CreateEventW
QueryDosDeviceW
AddAtomA
OpenJobObjectW
FoldStringW
GetOEMCP
GetModuleHandleA
HeapSetInformation
EnumResourceNamesA
FatalAppExitA
SetProcessShutdownParameters
SetFileShortNameA
GetDiskFreeSpaceExW
GetCurrentProcessId
LCMapStringW
ReadFile
GetProcessHeap
SetEndOfFile
HeapSize
GetStringTypeW
LoadLibraryA
EnumResourceNamesW
MultiByteToWideChar
WriteConsoleW
FlushFileBuffers
SetStdHandle
CreateFileW
HeapAlloc
HeapReAlloc
GetCommandLineW
GetStartupInfoW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
DecodePointer
TerminateProcess
GetCurrentProcess
IsProcessorFeaturePresent
WideCharToMultiByte
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapCreate
ExitProcess
WriteFile
GetModuleFileNameW
RtlUnwind
CloseHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
IsValidCodePage
Sleep
RaiseException
user32
GetComboBoxInfo
SetClipboardViewer
GetCaretPos
CharUpperBuffW
ChangeMenuW
GetMenuState
GetDC
GetSysColorBrush
gdi32
GetCharABCWidthsI
shell32
FindExecutableA
ole32
StringFromIID
CoSuspendClassObjects
winhttp
WinHttpCheckPlatform
Sections
.text Size: 259KB - Virtual size: 258KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 95KB - Virtual size: 36.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.jizo Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.koyuvaw Size: 1024B - Virtual size: 923B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 53KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ