Static task
static1
Behavioral task
behavioral1
Sample
384bf7f4377f010b2001bb8ae97b770b96f909ad793fc50642fc6e1a2b69d91c.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
384bf7f4377f010b2001bb8ae97b770b96f909ad793fc50642fc6e1a2b69d91c.exe
Resource
win10v2004-20240802-en
General
-
Target
384bf7f4377f010b2001bb8ae97b770b96f909ad793fc50642fc6e1a2b69d91c
-
Size
533KB
-
MD5
63465c3b6d0c8205d28a6d36301a9a19
-
SHA1
072ddd7e9694968e71261f44fd121ab032bbeca8
-
SHA256
384bf7f4377f010b2001bb8ae97b770b96f909ad793fc50642fc6e1a2b69d91c
-
SHA512
6605ec5c3499e7f22525985c51ef7515b28aba7c754b6d1389fe0f8f163670eda8980fcb272362b9cbc21d83504a2e3be314943a46bac66e82d37079a9896a2f
-
SSDEEP
12288:05ueWPPYNOyYWAL506gOcMR0XNV6UwNmjQl9mCc:wKvWANHcc0z6vNQQlX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 384bf7f4377f010b2001bb8ae97b770b96f909ad793fc50642fc6e1a2b69d91c
Files
-
384bf7f4377f010b2001bb8ae97b770b96f909ad793fc50642fc6e1a2b69d91c.exe windows:6 windows x64 arch:x64
2929db3fa055eca736d7911fabd6fd14
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
advapi32
SystemFunction036
kernel32
ReleaseSRWLockExclusive
WaitForSingleObject
GetLastError
GetFileInformationByHandle
GetModuleHandleW
LoadLibraryW
GetProcAddress
FreeLibrary
GetCommandLineW
AddVectoredExceptionHandler
SetThreadStackGuarantee
HeapAlloc
GetProcessHeap
HeapFree
HeapReAlloc
GetStdHandle
GetModuleHandleA
GetCurrentThread
TryAcquireSRWLockExclusive
GetConsoleMode
SetFilePointerEx
MultiByteToWideChar
WriteConsoleW
SetLastError
FormatMessageW
GetCurrentProcess
GetEnvironmentVariableW
GetModuleFileNameW
CreateFileW
SetFileInformationByHandle
GetFullPathNameW
GetEnvironmentStringsW
AcquireSRWLockExclusive
CompareStringOrdinal
GetSystemDirectoryW
GetWindowsDirectoryW
CreateProcessW
GetFileAttributesW
DuplicateHandle
InitializeProcThreadAttributeList
UpdateProcThreadAttribute
DeleteProcThreadAttributeList
CloseHandle
GetCurrentProcessId
CreateNamedPipeW
CreateThread
ReadFileEx
SleepEx
WriteFileEx
WaitForMultipleObjects
GetOverlappedResult
GetExitCodeProcess
CreateEventW
CancelIo
ReadFile
ExitProcess
GetCurrentDirectoryW
RtlCaptureContext
RtlLookupFunctionEntry
CreateMutexA
WaitForSingleObjectEx
LoadLibraryA
ReleaseMutex
RtlVirtualUnwind
AcquireSRWLockShared
ReleaseSRWLockShared
GetConsoleOutputCP
FreeEnvironmentStringsW
FlushFileBuffers
HeapSize
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
RtlUnwindEx
EncodePointer
RaiseException
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
RtlPcToFileHeader
WriteFile
TerminateProcess
GetModuleHandleExW
GetCommandLineA
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
WideCharToMultiByte
SetEnvironmentVariableW
SetStdHandle
GetFileType
GetStringTypeW
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
CompareStringW
LCMapStringW
ntdll
NtWriteFile
RtlNtStatusToDosError
NtReadFile
bcrypt
BCryptGenRandom
Sections
.text Size: 351KB - Virtual size: 350KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 159KB - Virtual size: 158KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 348B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ