Static task
static1
Behavioral task
behavioral1
Sample
96f02e702999aee025a959a17204519682332fe5a8e4616ad34ab3c188e73fe0.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
96f02e702999aee025a959a17204519682332fe5a8e4616ad34ab3c188e73fe0.exe
Resource
win11-20240802-en
General
-
Target
96f02e702999aee025a959a17204519682332fe5a8e4616ad34ab3c188e73fe0
-
Size
411KB
-
MD5
0ec42499fea91528c6ce9470684428fb
-
SHA1
3757fe5f0e4d3350d7f6e0c2b34a162757a15d41
-
SHA256
96f02e702999aee025a959a17204519682332fe5a8e4616ad34ab3c188e73fe0
-
SHA512
e1899330a49b8096f017e4b63ad58208ba41fffabb610442462e50a181b68495ce10c6987e1eb23cf364b3a7e88b2cdafe237f77d5e6be0eeae2560e6bb81367
-
SSDEEP
6144:vfegZ4S+8jpSD4JPuLe/sU3yVozMcWLjxlyBik9RoYFEH:neyR+8jpS0JsbdVozMcWjxlSE
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 96f02e702999aee025a959a17204519682332fe5a8e4616ad34ab3c188e73fe0
Files
-
96f02e702999aee025a959a17204519682332fe5a8e4616ad34ab3c188e73fe0.exe windows:5 windows x86 arch:x86
341ea7b3a277e5a7d843a424fc81f8ad
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CommConfigDialogA
SetConsoleTextAttribute
GetConsoleAliasA
SetEnvironmentVariableW
HeapFree
LockFile
GetModuleHandleW
GetTickCount
CreateNamedPipeW
GetConsoleAliasesLengthA
EnumTimeFormatsA
EnumTimeFormatsW
GlobalAlloc
LoadLibraryW
IsBadCodePtr
SetVolumeMountPointA
SetConsoleCP
GetSystemDirectoryA
CreateActCtxA
ReplaceFileA
CreateJobObjectA
GetConsoleAliasesW
GetLastError
GetProcAddress
PeekConsoleInputW
GlobalFree
LoadLibraryA
SetFilePointer
CreateFileMappingW
IsSystemResumeAutomatic
GetNumberFormatW
CreateEventW
QueryDosDeviceW
AddAtomA
OpenJobObjectW
FoldStringW
GetOEMCP
GetModuleHandleA
HeapSetInformation
EnumResourceNamesA
FatalAppExitA
SetProcessShutdownParameters
SetFileShortNameA
GetDiskFreeSpaceExW
GetCurrentProcessId
LCMapStringW
GetProcessHeap
SetEndOfFile
GetStringTypeW
HeapSize
WriteConsoleW
CreateFileA
InterlockedExchangeAdd
EnumResourceNamesW
FlushFileBuffers
SetStdHandle
IsValidCodePage
GetACP
GetCPInfo
CreateFileW
HeapAlloc
HeapReAlloc
GetCommandLineW
GetStartupInfoW
IsProcessorFeaturePresent
EncodePointer
DecodePointer
EnterCriticalSection
LeaveCriticalSection
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
ExitProcess
WriteFile
GetModuleFileNameW
HeapCreate
RtlUnwind
MultiByteToWideChar
ReadFile
CloseHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
QueryPerformanceCounter
GetSystemTimeAsFileTime
RaiseException
Sleep
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
user32
GetCaretPos
DrawMenuBar
SetClipboardViewer
CharUpperBuffW
ChangeMenuW
GetDC
GetMenuBarInfo
GetSysColor
gdi32
GetCharWidthA
GetCharABCWidthsI
shell32
FindExecutableA
ole32
StringFromIID
CoSuspendClassObjects
winhttp
WinHttpCheckPlatform
Sections
.text Size: 260KB - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 95KB - Virtual size: 36.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.daxujo Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.budod Size: 1024B - Virtual size: 923B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 47KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ