Static task
static1
Behavioral task
behavioral1
Sample
fb35fbb6b4e4c9bbbc67e71aa2313e3446a70fcba7a60c26553d4e530f94bdf2.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
fb35fbb6b4e4c9bbbc67e71aa2313e3446a70fcba7a60c26553d4e530f94bdf2.exe
Resource
win10v2004-20240802-en
General
-
Target
fb35fbb6b4e4c9bbbc67e71aa2313e3446a70fcba7a60c26553d4e530f94bdf2.exe
-
Size
199KB
-
MD5
a77fafcd026cba6d7ee5ea7e504684d8
-
SHA1
5e77807eadd64328d37a716b7bcb37c03733fea5
-
SHA256
fb35fbb6b4e4c9bbbc67e71aa2313e3446a70fcba7a60c26553d4e530f94bdf2
-
SHA512
2bd821416afb283710464b5629653aae96a0c4244da42d1f19c50de9c609ddcb42cd6d9c4be8c20376a6c20c89f37c6c6c315bdcff8be30d0bdd880217c0eec3
-
SSDEEP
1536:ExCpc9qVLC4XAzWJvwP6OTJcqiCaiz4KB/D2Vb9GQrn+C0lBFY5oIjuEVFH:XBLRHjE+qmizlB/D2Vb9Gq+C+B25ovM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fb35fbb6b4e4c9bbbc67e71aa2313e3446a70fcba7a60c26553d4e530f94bdf2.exe
Files
-
fb35fbb6b4e4c9bbbc67e71aa2313e3446a70fcba7a60c26553d4e530f94bdf2.exe.exe windows:5 windows x86 arch:x86
4b1b4cc56938232be2091743ce9340b4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFullPathNameW
DebugActiveProcessStop
OpenJobObjectA
SetVolumeMountPointW
GetModuleHandleW
GetTickCount
GetSystemTimes
LoadLibraryW
Sleep
FormatMessageW
WriteConsoleW
GetTimeZoneInformation
SetConsoleTitleA
VirtualUnlock
InterlockedExchange
lstrcmpiA
GetProcAddress
GetNumaHighestNodeNumber
GetAtomNameA
LoadLibraryA
OpenWaitableTimerW
LocalAlloc
GetCommMask
OpenJobObjectW
FoldStringW
EnumDateFormatsA
CreateWaitableTimerW
FreeEnvironmentStringsW
VirtualProtect
SetCalendarInfoA
SetFileShortNameA
DeleteAtom
LocalFree
CloseHandle
CreateFileA
HeapAlloc
GetStartupInfoW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
HeapFree
VirtualFree
VirtualAlloc
HeapReAlloc
HeapCreate
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
ReadFile
GetModuleFileNameW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
GetLastError
InterlockedDecrement
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
SetFilePointer
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
InitializeCriticalSectionAndSpinCount
RtlUnwind
MultiByteToWideChar
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
HeapSize
FlushFileBuffers
user32
CopyRect
winhttp
WinHttpOpenRequest
Sections
.text Size: 137KB - Virtual size: 137KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 44KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ