Static task
static1
Behavioral task
behavioral1
Sample
a0d6d158d68e4d97d1e58542a9c059aa36c5345b0f907f36e28f4fc0e1d7aa0b.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a0d6d158d68e4d97d1e58542a9c059aa36c5345b0f907f36e28f4fc0e1d7aa0b.exe
Resource
win10v2004-20240802-en
General
-
Target
a0d6d158d68e4d97d1e58542a9c059aa36c5345b0f907f36e28f4fc0e1d7aa0b
-
Size
549KB
-
MD5
f4fc8eb463e1464e196fa123afb1d913
-
SHA1
f6c85fafaf592ca1769f93014e136446706bf84c
-
SHA256
a0d6d158d68e4d97d1e58542a9c059aa36c5345b0f907f36e28f4fc0e1d7aa0b
-
SHA512
000e1080e3d418798a670a252419d1d9114b146710f198922bb0fe844d0ea2cd0be636ca00c8fd5e0d972f727e44ad89f81640ba5c871ac7e15f5dbed491420a
-
SSDEEP
3072:F/V+wu70dwiJ3GiZn3YZ+/mpluWTe2h2A3x070FAIAiaLNdM/5njwa8p:FNRBVYMmplJCAB079I9GdijZ8p
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a0d6d158d68e4d97d1e58542a9c059aa36c5345b0f907f36e28f4fc0e1d7aa0b
Files
-
a0d6d158d68e4d97d1e58542a9c059aa36c5345b0f907f36e28f4fc0e1d7aa0b.exe windows:6 windows x64 arch:x64
c14786cebcd5d492f1f34325766c6aee
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
CreateFileA
WriteFile
CloseHandle
QueryPerformanceCounter
QueryPerformanceFrequency
HeapAlloc
HeapFree
GetProcessHeap
Sleep
GetCurrentProcess
WriteProcessMemory
GetModuleHandleW
GetProcAddress
LoadLibraryA
MultiByteToWideChar
GetModuleHandleExW
FreeLibrary
ExitProcess
LCIDToLocaleName
RaiseException
VirtualQuery
RtlUnwindEx
TerminateProcess
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
LCMapStringEx
WideCharToMultiByte
DecodePointer
EncodePointer
GetLocaleInfoEx
DeleteCriticalSection
InitializeCriticalSectionEx
LeaveCriticalSection
EnterCriticalSection
user32
LoadStringW
wininet
InternetCloseHandle
InternetOpenUrlA
InternetReadFile
InternetOpenW
msvcrt
_fsopen
fseek
realloc
_errno
abort
__strncnt
fread
_callnewh
_initterm
_initterm_e
_set_fmode
strcpy_s
_lock
_unlock
_iob
___lc_handle_func
?terminate@@YAXXZ
__getmainargs
islower
_environ
_msize
_XcptFilter
__set_app_type
__argc
__argv
?_set_new_mode@@YAHH@Z
_commode
_isatty
_fileno
fgetpos
fgetc
fflush
fclose
rand
srand
free
strlen
wcslen
_local_unwind
__DestructExceptionObject
__CxxFrameHandler3
_amsg_exit
__uncaught_exception
__C_specific_handler
_CxxThrowException
memset
memmove
memcpy
memcmp
memchr
_wcsdup
calloc
___lc_codepage_func
__pctype_func
isupper
malloc
_time64
ceilf
ungetc
setvbuf
_fseeki64
fsetpos
strchr
wcsrchr
Sections
.text Size: 63KB - Virtual size: 62KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 30KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 680B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rsrc Size: 438KB - Virtual size: 438KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ