Static task
static1
Behavioral task
behavioral1
Sample
78397182d096d0ad837be6fb8b1760f4ed09b4dfd9107b704906fdaf6ca4b10e.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
78397182d096d0ad837be6fb8b1760f4ed09b4dfd9107b704906fdaf6ca4b10e.exe
Resource
win10v2004-20240802-en
General
-
Target
78397182d096d0ad837be6fb8b1760f4ed09b4dfd9107b704906fdaf6ca4b10e
-
Size
165KB
-
MD5
366ad7e6690008bdc1f0bf2a2a869a42
-
SHA1
2d28c7b7bdd0a7becf3fbd9ae9767e6b99d34efc
-
SHA256
78397182d096d0ad837be6fb8b1760f4ed09b4dfd9107b704906fdaf6ca4b10e
-
SHA512
f092078f1e189b8d7ce33c3cc13ee28cf4a9b01f4a93f8db48a0c3d178b80dc2444905f4c745aabd4d65ca976a77379e690f81fc3f024f9a1eac2e8618c1956d
-
SSDEEP
3072:x/V+wu70dwiJ3GiZn3YZ+/mpluWTe2h2A3xr70FAI:xNRBVYMmplJCABr79I
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 78397182d096d0ad837be6fb8b1760f4ed09b4dfd9107b704906fdaf6ca4b10e
Files
-
78397182d096d0ad837be6fb8b1760f4ed09b4dfd9107b704906fdaf6ca4b10e.exe windows:6 windows x64 arch:x64
c14786cebcd5d492f1f34325766c6aee
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
CreateFileA
WriteFile
CloseHandle
QueryPerformanceCounter
QueryPerformanceFrequency
HeapAlloc
HeapFree
GetProcessHeap
Sleep
GetCurrentProcess
WriteProcessMemory
GetModuleHandleW
GetProcAddress
LoadLibraryA
MultiByteToWideChar
GetModuleHandleExW
FreeLibrary
ExitProcess
LCIDToLocaleName
RaiseException
VirtualQuery
RtlUnwindEx
TerminateProcess
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
LCMapStringEx
WideCharToMultiByte
DecodePointer
EncodePointer
GetLocaleInfoEx
DeleteCriticalSection
InitializeCriticalSectionEx
LeaveCriticalSection
EnterCriticalSection
user32
LoadStringW
wininet
InternetCloseHandle
InternetOpenUrlA
InternetReadFile
InternetOpenW
msvcrt
_fsopen
fseek
realloc
_errno
abort
__strncnt
fread
_callnewh
_initterm
_initterm_e
_set_fmode
strcpy_s
_lock
_unlock
_iob
___lc_handle_func
?terminate@@YAXXZ
__getmainargs
islower
_environ
_msize
_XcptFilter
__set_app_type
__argc
__argv
?_set_new_mode@@YAHH@Z
_commode
_isatty
_fileno
fgetpos
fgetc
fflush
fclose
rand
srand
free
strlen
wcslen
_local_unwind
__DestructExceptionObject
__CxxFrameHandler3
_amsg_exit
__uncaught_exception
__C_specific_handler
_CxxThrowException
memset
memmove
memcpy
memcmp
memchr
_wcsdup
calloc
___lc_codepage_func
__pctype_func
isupper
malloc
_time64
ceilf
ungetc
setvbuf
_fseeki64
fsetpos
strchr
wcsrchr
Sections
.text Size: 63KB - Virtual size: 62KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 30KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 680B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rsrc Size: 55KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ