Static task
static1
Behavioral task
behavioral1
Sample
f7b70704788546880c3421d09715e2694899a4a0a40f217ac46d47e3fd26dd39.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
f7b70704788546880c3421d09715e2694899a4a0a40f217ac46d47e3fd26dd39.exe
Resource
win11-20240802-en
General
-
Target
f7b70704788546880c3421d09715e2694899a4a0a40f217ac46d47e3fd26dd39
-
Size
569KB
-
MD5
477b9eaf047e24b0980b31f165ef95df
-
SHA1
dca5b15d72def6c89f6a120a3feb7102d13f031d
-
SHA256
f7b70704788546880c3421d09715e2694899a4a0a40f217ac46d47e3fd26dd39
-
SHA512
ff899ef3c857d03140a717888625afa318d02e41ec1e536c670fff14c802973166e51acda1f75fa4288d02dc376991d754afc1e98b875058ed00c40d8a245f3f
-
SSDEEP
12288:rp5r9HpbmOIDkxRiJPD2l7EbnfjxLNBkTx3jb:r/niORuP6lwbnfpNBux3v
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f7b70704788546880c3421d09715e2694899a4a0a40f217ac46d47e3fd26dd39
Files
-
f7b70704788546880c3421d09715e2694899a4a0a40f217ac46d47e3fd26dd39.exe windows:5 windows x86 arch:x86
a03b1328e062218675e1bf5942df1ea0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
EnumResourceNamesW
SetFilePointer
PeekNamedPipe
GetConsoleAliasExesA
CommConfigDialogA
GetConsoleAliasExesLengthA
InterlockedIncrement
SetDefaultCommConfigW
GetSystemWindowsDirectoryW
QueryDosDeviceA
InterlockedCompareExchange
UnlockFile
GetTickCount
CreateActCtxW
GlobalAlloc
SetFileShortNameW
LoadLibraryW
GetCalendarInfoA
SetConsoleCP
HeapDestroy
GetFileAttributesA
GetACP
CreateJobObjectA
LCMapStringA
GetLastError
GetCurrentDirectoryW
SetLastError
GetProcAddress
FindVolumeMountPointClose
PeekConsoleInputW
CreateNamedPipeA
GlobalFree
GetProcessVersion
SetThreadPriorityBoost
LoadLibraryA
CreateFileMappingW
CreateHardLinkW
GetNumberFormatW
CreateEventW
SetConsoleWindowInfo
HeapWalk
OpenJobObjectW
SetEnvironmentVariableA
GetModuleFileNameA
EnumDateFormatsA
VirtualProtect
SetProcessShutdownParameters
OpenSemaphoreW
GetDiskFreeSpaceExA
GetCurrentProcessId
WriteConsoleW
HeapSize
FlushFileBuffers
GetConsoleMode
GetConsoleCP
RtlUnwind
SetStdHandle
GetStringTypeW
LCMapStringW
WideCharToMultiByte
CreateFileW
HeapAlloc
MultiByteToWideChar
HeapReAlloc
GetCommandLineW
HeapSetInformation
GetStartupInfoW
RaiseException
IsProcessorFeaturePresent
GetModuleHandleW
ExitProcess
DecodePointer
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
TerminateProcess
GetCurrentProcess
HeapFree
WriteFile
GetStdHandle
GetModuleFileNameW
HeapCreate
GetCPInfo
InterlockedDecrement
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThreadId
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
CloseHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetSystemTimeAsFileTime
Sleep
user32
GetDC
ChangeMenuW
GetKeyNameTextA
LoadMenuA
DdeQueryStringA
GetWindowTextLengthA
CharUpperBuffA
LoadMenuW
GetMenuState
GetMenuStringA
winhttp
WinHttpReadData
msimg32
AlphaBlend
Sections
.text Size: 441KB - Virtual size: 441KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 93KB - Virtual size: 1.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ