Static task
static1
Behavioral task
behavioral1
Sample
0fd3abe452287b77c4b490aa432eb440N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
0fd3abe452287b77c4b490aa432eb440N.exe
Resource
win10v2004-20240802-en
General
-
Target
0fd3abe452287b77c4b490aa432eb440N.exe
-
Size
3.5MB
-
MD5
0fd3abe452287b77c4b490aa432eb440
-
SHA1
669c6393fd77e4971e8153eddc66d903cceb3c47
-
SHA256
3041da58463436c881263e856b63ed8c6fc59ac9bd09ac3b48ef198bc50b8478
-
SHA512
735081569f1eb9f8c06e593e8abc86fe8fd35ec96f4f4c7257c67dca005f08043c592f7d236cfe9227751abef9f37fcdc5c7246347e7f46932a397159681a8be
-
SSDEEP
49152:UzfTUoiT57qOD2oBb/ApG7aWyfjatzXQZIazvTpBVsiMEk1B3dhehdX2yz1WWJNa:0fiIphDfjatzgZZOIk1/Uh4yzbSiJm
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0fd3abe452287b77c4b490aa432eb440N.exe
Files
-
0fd3abe452287b77c4b490aa432eb440N.exe.exe windows:5 windows x86 arch:x86
84952cf42c11c5005cda33b2c3a529bf
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
Sleep
DeleteFileA
CloseHandle
InterlockedExchange
TlsGetValue
TlsSetValue
TlsFree
TlsAlloc
SetLastError
WaitForSingleObject
SetFilePointer
GetFileType
GetLastError
WriteFile
ReadFile
EnterCriticalSection
LeaveCriticalSection
GetFileAttributesExA
GetFileSize
GetFileAttributesA
SetEndOfFile
GetLocalTime
ReleaseMutex
GetCurrentThreadId
CreateMutexA
GetStdHandle
GetThreadLocale
LoadLibraryA
FormatMessageA
IsDebuggerPresent
GetModuleHandleA
GetProcAddress
CreateFileA
FreeLibrary
DeleteCriticalSection
InitializeCriticalSection
SetEvent
CreateEventA
ExitThread
TerminateThread
CreateProcessA
SetThreadPriority
GetVersionExA
GetFileInformationByHandle
GetFullPathNameA
GetTempFileNameA
GetTempPathA
SetConsoleCtrlHandler
GetACP
GetCommandLineA
SetErrorMode
FlushFileBuffers
GetSystemDirectoryA
GetExitCodeProcess
GetSystemInfo
GetCurrentProcess
GetProcessTimes
GetSystemTimeAsFileTime
HeapAlloc
HeapReAlloc
HeapFree
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeA
FindFirstFileExA
WriteConsoleW
GetModuleFileNameW
GetModuleHandleW
ExitProcess
DecodePointer
EncodePointer
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
SetStdHandle
InitializeCriticalSectionAndSpinCount
GetCurrentProcessId
GetDriveTypeW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
RtlUnwind
IsProcessorFeaturePresent
GetTimeZoneInformation
HeapCreate
SetHandleCount
GetStartupInfoW
PeekNamedPipe
GetCurrentDirectoryW
LoadLibraryW
HeapSetInformation
InterlockedIncrement
InterlockedDecrement
GetCurrentThread
MultiByteToWideChar
HeapSize
GetCPInfo
GetOEMCP
IsValidCodePage
LCMapStringW
GetProcessHeap
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetStringTypeW
CompareStringW
SetEnvironmentVariableA
CreateFileW
VirtualQuery
imagehlp
SymCleanup
StackWalk64
SymInitialize
Sections
.text Size: 2.0MB - Virtual size: 2.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text1 Size: 512B - Virtual size: 176B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 259KB - Virtual size: 259KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 247KB - Virtual size: 1191.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.trace Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1.0MB - Virtual size: 1.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE