Static task
static1
Behavioral task
behavioral1
Sample
19201ac7ae3c63491b02f8abb05af5f719879d8845b9911fe160dc0b1388ade0.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
19201ac7ae3c63491b02f8abb05af5f719879d8845b9911fe160dc0b1388ade0.exe
Resource
win10v2004-20240802-en
General
-
Target
19201ac7ae3c63491b02f8abb05af5f719879d8845b9911fe160dc0b1388ade0
-
Size
180KB
-
MD5
78d1df242b939de86d1cd6d7f8a565d3
-
SHA1
97dd15bcfaae7eecb730993e4d6f6d592c20ec76
-
SHA256
19201ac7ae3c63491b02f8abb05af5f719879d8845b9911fe160dc0b1388ade0
-
SHA512
484f74363b2d1a11330c95381f01fd5ec8608723836e284a6ba78b647073a090a7772f78369fbac5796ad101133d13959aec43db1c1e8bae480fc9adfce6e04b
-
SSDEEP
3072:5kmDQ+tURs+aApf73JHz8YlliMFOmxBSvtUx5g9ujn:5kSQ+srNxgMwmxAv0d
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 19201ac7ae3c63491b02f8abb05af5f719879d8845b9911fe160dc0b1388ade0
Files
-
19201ac7ae3c63491b02f8abb05af5f719879d8845b9911fe160dc0b1388ade0.exe windows:4 windows x86 arch:x86
8612025c75aab1269d35f8fa9169303d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
LoadLibraryW
CreateProcessW
MoveFileExW
GetLastError
WaitForSingleObject
TerminateProcess
Sleep
DeleteFileW
SetFileAttributesW
GetFileAttributesW
Process32NextW
CloseHandle
lstrlenA
OpenProcess
Process32FirstW
CreateToolhelp32Snapshot
MultiByteToWideChar
FindClose
FindNextFileW
FindFirstFileW
UnmapViewOfFile
GetCurrentThreadId
OpenFileMappingA
CreateDirectoryW
lstrlenW
WideCharToMultiByte
QueryDosDeviceW
GetLogicalDriveStringsW
GetModuleFileNameW
GetModuleHandleW
VirtualFree
VirtualAlloc
lstrcmpiW
lstrcpyW
FormatMessageW
TerminateThread
CreateThread
DuplicateHandle
GetCurrentProcess
lstrcatW
FreeLibrary
CreateRemoteThread
FlushFileBuffers
GetStringTypeW
GetCurrentProcessId
GetCommandLineW
MapViewOfFile
OutputDebugStringW
GetStringTypeA
SetStdHandle
SetConsoleCtrlHandler
LoadLibraryA
SetFilePointer
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
IsBadWritePtr
WriteFile
HeapCreate
RtlUnwind
MoveFileW
GetModuleHandleA
GetStartupInfoW
GetVersion
ExitProcess
HeapFree
RaiseException
HeapReAlloc
HeapAlloc
HeapSize
LCMapStringA
LCMapStringW
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetEnvironmentStrings
GetCommandLineA
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetModuleFileNameA
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
ReadFile
user32
MessageBoxW
advapi32
LookupPrivilegeValueW
AdjustTokenPrivileges
OpenProcessToken
shell32
SHFileOperationW
psapi
GetModuleFileNameExW
GetModuleFileNameExA
GetProcessImageFileNameW
EnumProcessModules
ws2_32
WSAStartup
send
closesocket
Sections
.text Size: 80KB - Virtual size: 78KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 88KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE