Static task
static1
Behavioral task
behavioral1
Sample
184f480d1e00160a76cc5c3af4db19aba06e2fb2d1b9f752e55737495e35ab19.exe
Resource
win10v2004-20240802-en
General
-
Target
184f480d1e00160a76cc5c3af4db19aba06e2fb2d1b9f752e55737495e35ab19
-
Size
395KB
-
MD5
1a974c2ec172e268da196c03e3040a80
-
SHA1
a9f38753ff6ead9382c418a1725ad76d79ab624e
-
SHA256
184f480d1e00160a76cc5c3af4db19aba06e2fb2d1b9f752e55737495e35ab19
-
SHA512
a666909f30c94d1a59f89ac73bfbc603ad129eeeaaa97109d4aae46d0e5cdd33cf36d86a0d02bcf6fd361f69b480546d28f95c6bf29a955afbb6693328e17a4b
-
SSDEEP
6144:i9XUsnsqQAdbvPykfjL+KWYKyz3dRWVFNXWe4JRZUfFcFojesp8l7:i9EsnsSkkP+KvKYXEFdWeQZUd7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 184f480d1e00160a76cc5c3af4db19aba06e2fb2d1b9f752e55737495e35ab19
Files
-
184f480d1e00160a76cc5c3af4db19aba06e2fb2d1b9f752e55737495e35ab19.exe windows:5 windows x86 arch:x86
a26339dff7dfc32ac46cb386c0841f9f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetConsoleAliasExesA
CommConfigDialogA
GetConsoleAliasExesLengthA
OpenJobObjectA
GetLogicalDriveStringsW
SetDefaultCommConfigW
GetSystemWindowsDirectoryW
SetEnvironmentVariableW
CreateJobObjectW
QueryDosDeviceA
InterlockedCompareExchange
SetVolumeMountPointW
UnlockFile
OpenSemaphoreA
_lcreat
GetTickCount
GetNumberFormatA
CreateActCtxW
GlobalAlloc
SetFileShortNameW
LoadLibraryW
LocalShrink
GetCalendarInfoA
CreateEventA
SetConsoleCP
HeapDestroy
GetFileAttributesA
VerifyVersionInfoA
GetShortPathNameA
GetLastError
GetCurrentDirectoryW
SetLastError
GetProcAddress
PeekConsoleInputW
CreateNamedPipeA
GlobalFree
GetProcessVersion
_hwrite
SetThreadPriorityBoost
LoadLibraryA
InterlockedExchangeAdd
CreateFileMappingW
CreateHardLinkW
GetNumberFormatW
SetConsoleWindowInfo
GetModuleFileNameA
EnumResourceNamesA
VirtualProtect
EnumDateFormatsW
SetProcessShutdownParameters
GetDiskFreeSpaceExA
ReadConsoleInputW
GetCurrentProcessId
LCMapStringW
HeapSize
RtlUnwind
GetStringTypeW
RaiseException
WideCharToMultiByte
Sleep
HeapAlloc
MultiByteToWideChar
HeapReAlloc
GetCommandLineW
HeapSetInformation
GetStartupInfoW
GetModuleHandleW
ExitProcess
DecodePointer
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
TerminateProcess
GetCurrentProcess
HeapFree
WriteFile
GetStdHandle
GetModuleFileNameW
HeapCreate
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThreadId
IsProcessorFeaturePresent
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
QueryPerformanceCounter
GetSystemTimeAsFileTime
LeaveCriticalSection
EnterCriticalSection
user32
ChangeMenuW
GetKeyNameTextA
LoadMenuA
GetWindowTextLengthA
GetDC
LoadMenuW
GetMenuState
CharUpperW
GetMenuStringA
GetCaretPos
GetCaretBlinkTime
DdeQueryStringW
Sections
.text Size: 242KB - Virtual size: 242KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 94KB - Virtual size: 1.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 58KB - Virtual size: 369KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ