Static task
static1
Behavioral task
behavioral1
Sample
a9dfb8b9764e13ffbe61964254de5f4d366a57bea2f682c30fae730363336700.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a9dfb8b9764e13ffbe61964254de5f4d366a57bea2f682c30fae730363336700.exe
Resource
win10v2004-20240802-en
General
-
Target
a9dfb8b9764e13ffbe61964254de5f4d366a57bea2f682c30fae730363336700
-
Size
400KB
-
MD5
6fa7be7dc36cecadb81a410733d2f3db
-
SHA1
2227a3663fd81c38ec5044201f981659056d233a
-
SHA256
a9dfb8b9764e13ffbe61964254de5f4d366a57bea2f682c30fae730363336700
-
SHA512
d58ea72fcb94bd99f5fc46278b9214405844008cc808e6c539c038851f69629372fe604d517add338053936567f1d6f913c40ffa806fc4efbe0745e3c7a844d0
-
SSDEEP
6144:2qJqNVXFrSWbAPA28euuF9c8YkhkDH3aTM3pM2EPp7TRUdrf+xw8OqZQusfQgcGu:2dNVBSxY6hkeTM5M2+76p+0fH02Kz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a9dfb8b9764e13ffbe61964254de5f4d366a57bea2f682c30fae730363336700
Files
-
a9dfb8b9764e13ffbe61964254de5f4d366a57bea2f682c30fae730363336700.exe windows:6 windows x86 arch:x86
1d516ed85fb093fe58f381833a7ff22e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
oleaut32
SysAllocString
SysAllocStringLen
VariantClear
VariantCopy
SysFreeString
SysStringByteLen
SysStringLen
user32
CharUpperW
advapi32
AdjustTokenPrivileges
GetFileSecurityW
SetFileSecurityW
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
OpenProcessToken
LookupPrivilegeValueW
kernel32
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
GetProcessHeap
SetStdHandle
GetStringTypeW
ReadConsoleW
HeapSize
WriteConsoleW
OpenFileMappingW
GetLastError
MultiByteToWideChar
WideCharToMultiByte
FreeLibrary
GetModuleFileNameW
LoadLibraryExW
LoadLibraryW
LocalFree
FormatMessageW
SetCurrentDirectoryW
GetCurrentDirectoryW
CreateDirectoryW
CreateFileW
DeleteFileW
RemoveDirectoryW
SetFileAttributesW
SetFileTime
GetTempPathW
CloseHandle
SetLastError
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
GetModuleHandleW
GetProcAddress
MoveFileW
FindClose
FindFirstFileW
FindNextFileW
GetFileAttributesW
GetFileInformationByHandle
GetLogicalDriveStringsW
GetModuleHandleA
GetFileSize
ReadFile
SetEndOfFile
SetFilePointer
WriteFile
DeviceIoControl
GetDiskFreeSpaceW
GetCurrentProcess
CompareFileTime
FileTimeToLocalFileTime
FileTimeToSystemTime
GetSystemInfo
GlobalMemoryStatus
GetProcessAffinityMask
IsProcessorFeaturePresent
GetSystemTimeAsFileTime
FileTimeToDosDateTime
GetStdHandle
OpenEventW
DecodePointer
MapViewOfFile
UnmapViewOfFile
SetProcessAffinityMask
QueryPerformanceCounter
QueryPerformanceFrequency
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
GetProcessTimes
SetConsoleCtrlHandler
GetCommandLineW
SetFileApisToOEM
GetConsoleScreenBufferInfo
GetVersionExW
GetConsoleMode
SetConsoleMode
VirtualAlloc
VirtualFree
InitializeCriticalSection
SetEvent
WaitForSingleObject
CreateEventW
ResumeThread
SetThreadAffinityMask
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
InitializeSListHead
TerminateProcess
GetCPInfo
RtlUnwind
RaiseException
EncodePointer
VirtualQuery
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
CreateThread
ExitThread
FreeLibraryAndExitThread
GetModuleHandleExW
ExitProcess
GetCommandLineA
HeapAlloc
HeapFree
CompareStringW
LCMapStringW
GetFileType
FlushFileBuffers
GetConsoleOutputCP
GetFileSizeEx
SetFilePointerEx
HeapReAlloc
FindFirstFileExW
IsValidCodePage
GetACP
GetOEMCP
Sections
.text Size: 308KB - Virtual size: 308KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 70KB - Virtual size: 69KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ