Static task
static1
Behavioral task
behavioral1
Sample
21b67b33b3e2f3ae3ef8db06dba91b7438dca8b8c653148851ee265f3a41b50d.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
21b67b33b3e2f3ae3ef8db06dba91b7438dca8b8c653148851ee265f3a41b50d.exe
Resource
win10v2004-20240802-en
General
-
Target
21b67b33b3e2f3ae3ef8db06dba91b7438dca8b8c653148851ee265f3a41b50d
-
Size
1.2MB
-
MD5
bb62565acb8eaa20434c8f05d24c406f
-
SHA1
caaa8b0e843c67baa47f6ca15f7d678acc450328
-
SHA256
21b67b33b3e2f3ae3ef8db06dba91b7438dca8b8c653148851ee265f3a41b50d
-
SHA512
3388f2c5af00988f8378a0cfa9896346e28bff4bb9e426ace0e9fa96b25291e1ea649fbdfe87428d67c40c313ca2a039be8d722f686242df447b1abdea9f4952
-
SSDEEP
12288:S8rEbPBHwFxB/gYaGIUOJ0tknH5YOXKQVp+4KU1sO3CZbl4rz8+J4zN7W1U0Jo1G:Jx6YuWCWOXtIO3Cr43p4zoRSg5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 21b67b33b3e2f3ae3ef8db06dba91b7438dca8b8c653148851ee265f3a41b50d
Files
-
21b67b33b3e2f3ae3ef8db06dba91b7438dca8b8c653148851ee265f3a41b50d.exe windows:4 windows x64 arch:x64
6e09a21f99222f0db6d234115575bc66
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
oleaut32
SysStringLen
VariantClear
VariantCopy
SysAllocString
SysFreeString
SysAllocStringLen
user32
CharUpperW
CharPrevExA
advapi32
OpenProcessToken
SystemFunction036
GetFileSecurityW
SetFileSecurityW
RegOpenKeyExW
RegQueryValueExW
AdjustTokenPrivileges
LookupPrivilegeValueW
RegCloseKey
msvcrt
_c_exit
_XcptFilter
_onexit
__dllonexit
?terminate@@YAXXZ
??1type_info@@UEAA@XZ
__C_specific_handler
_beginthreadex
exit
_isatty
realloc
memset
strlen
wcsstr
wcscmp
_exit
memmove
fflush
fputc
fputs
_iob
fgetc
fclose
free
malloc
memcmp
_purecall
__CxxFrameHandler
_CxxThrowException
memcpy
_cexit
__getmainargs
__initenv
_initterm
__setusermatherr
_commode
_fmode
__set_app_type
strcmp
kernel32
SetThreadAffinityMask
CreateEventW
SetEvent
ResetEvent
CreateSemaphoreW
ReleaseSemaphore
InitializeCriticalSection
GetVersionExW
SetFileTime
ResumeThread
WaitForSingleObject
VirtualFree
VirtualAlloc
GetOEMCP
LocalFileTimeToFileTime
GetConsoleMode
SetConsoleMode
SetFileApisToOEM
GetCommandLineW
GetConsoleScreenBufferInfo
SetConsoleCtrlHandler
GetProcessTimes
QueryPerformanceFrequency
QueryPerformanceCounter
DeleteCriticalSection
SetProcessAffinityMask
OpenEventW
UnmapViewOfFile
MapViewOfFile
OpenFileMappingW
WaitForMultipleObjects
LeaveCriticalSection
EnterCriticalSection
GetStdHandle
GetSystemTimeAsFileTime
FileTimeToDosDateTime
DosDateTimeToFileTime
IsProcessorFeaturePresent
GlobalMemoryStatusEx
GetSystemInfo
GetProcessAffinityMask
FileTimeToLocalFileTime
FileTimeToSystemTime
CompareFileTime
GetCurrentProcess
GetDiskFreeSpaceW
SetEndOfFile
WriteFile
ReadFile
GetLastError
MultiByteToWideChar
WideCharToMultiByte
FreeLibrary
LoadLibraryW
GetModuleFileNameW
LocalFree
FormatMessageW
CloseHandle
CreateFileW
SetFileAttributesW
RemoveDirectoryW
MoveFileW
GetProcAddress
GetModuleHandleW
CreateDirectoryW
DeleteFileW
SetCurrentDirectoryW
GetCurrentDirectoryW
GetTempPathW
SetLastError
GetCurrentProcessId
GetTickCount
GetCurrentThreadId
GetFileInformationByHandle
FindClose
FindFirstFileW
FindNextFileW
GetModuleHandleA
GetFileAttributesW
GetLogicalDriveStringsW
DeviceIoControl
GetFileSize
SetFilePointer
Sections
.text Size: 917KB - Virtual size: 916KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 248KB - Virtual size: 247KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ