Static task
static1
Behavioral task
behavioral1
Sample
61524edf5904d47bc698828cc237e75bf16c58c0698734170154b0a18019aa4e.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
61524edf5904d47bc698828cc237e75bf16c58c0698734170154b0a18019aa4e.exe
Resource
win11-20240802-en
General
-
Target
61524edf5904d47bc698828cc237e75bf16c58c0698734170154b0a18019aa4e
-
Size
410KB
-
MD5
f87ba00ff563a2d6e093a05b3801187f
-
SHA1
2d13f40e89d3e275437152a01477914de868630e
-
SHA256
61524edf5904d47bc698828cc237e75bf16c58c0698734170154b0a18019aa4e
-
SHA512
509325090b5d776b3ee9c8d0add6382864d6e400a8a5daff28e75255e493bf5dfc795e17bce77183640729d8abee2f4f812188d803a9f9703f1cc9c83b94fe15
-
SSDEEP
6144:dmbRwbzaA33Kh1ds/goVlzt6uiR7KGxMZWhN5FoqNCoYFEH:dmt0zaA36h1aXVlzBiRrWWh3SE
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 61524edf5904d47bc698828cc237e75bf16c58c0698734170154b0a18019aa4e
Files
-
61524edf5904d47bc698828cc237e75bf16c58c0698734170154b0a18019aa4e.exe windows:5 windows x86 arch:x86
3a72cbc574d2556e27b80aed2b249440
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CommConfigDialogA
SetConsoleTextAttribute
GetConsoleAliasA
SetEnvironmentVariableW
HeapFree
LockFile
GetModuleHandleW
GetTickCount
CreateNamedPipeW
GetConsoleAliasesLengthA
EnumTimeFormatsA
EnumTimeFormatsW
GlobalAlloc
LoadLibraryW
IsBadCodePtr
SetVolumeMountPointA
SetConsoleCP
GetSystemDirectoryA
CreateActCtxA
ReplaceFileA
CreateJobObjectA
GetConsoleAliasesW
GetLastError
SetLastError
GetProcAddress
PeekConsoleInputW
GlobalFree
LoadLibraryA
SetFilePointer
CreateFileMappingW
IsSystemResumeAutomatic
GetNumberFormatW
CreateEventW
QueryDosDeviceW
AddAtomA
OpenJobObjectW
FoldStringW
GetOEMCP
GetModuleHandleA
HeapSetInformation
EnumResourceNamesA
FatalAppExitA
SetProcessShutdownParameters
SetFileShortNameA
GetDiskFreeSpaceExW
GetCurrentProcessId
LCMapStringW
GetProcessHeap
SetEndOfFile
GetStringTypeW
HeapSize
WriteConsoleW
CreateFileA
InterlockedExchangeAdd
EnumResourceNamesW
FlushFileBuffers
SetStdHandle
IsValidCodePage
GetACP
CreateFileW
GetCPInfo
HeapAlloc
HeapReAlloc
GetCommandLineW
GetStartupInfoW
IsProcessorFeaturePresent
EncodePointer
DecodePointer
EnterCriticalSection
LeaveCriticalSection
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
ExitProcess
WriteFile
GetModuleFileNameW
HeapCreate
RtlUnwind
MultiByteToWideChar
ReadFile
CloseHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
QueryPerformanceCounter
GetSystemTimeAsFileTime
RaiseException
Sleep
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
user32
DrawMenuBar
SetClipboardViewer
GetCaretPos
CharUpperBuffW
ChangeMenuW
GetDC
GetMenuBarInfo
GetSysColorBrush
gdi32
GetCharWidthA
GetCharABCWidthsI
shell32
FindExecutableA
ole32
StringFromIID
CoSuspendClassObjects
winhttp
WinHttpCheckPlatform
Sections
.text Size: 259KB - Virtual size: 259KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 95KB - Virtual size: 36.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.miyawoc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pefuze Size: 1024B - Virtual size: 923B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 47KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ