Static task
static1
Behavioral task
behavioral1
Sample
a93430890d33bf462a6b575203236d55598b124ed4a6be9bca8b968c782e3f0a.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
a93430890d33bf462a6b575203236d55598b124ed4a6be9bca8b968c782e3f0a.exe
Resource
win11-20240802-en
General
-
Target
a93430890d33bf462a6b575203236d55598b124ed4a6be9bca8b968c782e3f0a
-
Size
410KB
-
MD5
d39b809e804b34e87940876b4b2bcf09
-
SHA1
da063aca66be8f5e78d359fd607063011cf9d068
-
SHA256
a93430890d33bf462a6b575203236d55598b124ed4a6be9bca8b968c782e3f0a
-
SHA512
975f45271a82ae30c20c801c48751f4ea3e3a0a8589e62f2ee989accd27b6621488c3f41316734b312cd9dde8bc1fd69e3d6f5f050b3873d32a6f5ad9247b5ac
-
SSDEEP
12288:1Iu2TTPgj/hpx798ZBMF124xHmzvvNcE:+lgNphSZW2MGz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a93430890d33bf462a6b575203236d55598b124ed4a6be9bca8b968c782e3f0a
Files
-
a93430890d33bf462a6b575203236d55598b124ed4a6be9bca8b968c782e3f0a.exe windows:5 windows x86 arch:x86
341ea7b3a277e5a7d843a424fc81f8ad
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CommConfigDialogA
SetConsoleTextAttribute
GetConsoleAliasA
SetEnvironmentVariableW
HeapFree
LockFile
GetModuleHandleW
GetTickCount
CreateNamedPipeW
GetConsoleAliasesLengthA
EnumTimeFormatsA
EnumTimeFormatsW
GlobalAlloc
LoadLibraryW
IsBadCodePtr
SetVolumeMountPointA
SetConsoleCP
GetSystemDirectoryA
CreateActCtxA
ReplaceFileA
CreateJobObjectA
GetConsoleAliasesW
GetLastError
GetProcAddress
PeekConsoleInputW
GlobalFree
LoadLibraryA
SetFilePointer
CreateFileMappingW
IsSystemResumeAutomatic
GetNumberFormatW
CreateEventW
QueryDosDeviceW
AddAtomA
OpenJobObjectW
FoldStringW
GetOEMCP
GetModuleHandleA
HeapSetInformation
EnumResourceNamesA
FatalAppExitA
SetProcessShutdownParameters
SetFileShortNameA
GetDiskFreeSpaceExW
GetCurrentProcessId
LCMapStringW
GetProcessHeap
SetEndOfFile
GetStringTypeW
HeapSize
WriteConsoleW
CreateFileA
InterlockedExchangeAdd
EnumResourceNamesW
FlushFileBuffers
SetStdHandle
IsValidCodePage
GetACP
GetCPInfo
CreateFileW
HeapAlloc
HeapReAlloc
GetCommandLineW
GetStartupInfoW
IsProcessorFeaturePresent
EncodePointer
DecodePointer
EnterCriticalSection
LeaveCriticalSection
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
ExitProcess
WriteFile
GetModuleFileNameW
HeapCreate
RtlUnwind
MultiByteToWideChar
ReadFile
CloseHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
QueryPerformanceCounter
GetSystemTimeAsFileTime
RaiseException
Sleep
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
user32
GetCaretPos
DrawMenuBar
SetClipboardViewer
CharUpperBuffW
ChangeMenuW
GetDC
GetMenuBarInfo
GetSysColor
gdi32
GetCharWidthA
GetCharABCWidthsI
shell32
FindExecutableA
ole32
StringFromIID
CoSuspendClassObjects
winhttp
WinHttpCheckPlatform
Sections
.text Size: 259KB - Virtual size: 259KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 95KB - Virtual size: 36.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.mozek Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.juz Size: 1024B - Virtual size: 923B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 47KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ