Static task
static1
Behavioral task
behavioral1
Sample
894ba799502ca5eac58d1e82ed1c8fac99a391f1bf676beaacff5e1bbde1417b.exe
Resource
win10v2004-20240802-en
General
-
Target
894ba799502ca5eac58d1e82ed1c8fac99a391f1bf676beaacff5e1bbde1417b
-
Size
411KB
-
MD5
a1ea1ffe372eb3abb1d20740719cf37a
-
SHA1
32dccd07bbc77576cda357826fa36a74cd61667c
-
SHA256
894ba799502ca5eac58d1e82ed1c8fac99a391f1bf676beaacff5e1bbde1417b
-
SHA512
11bb26017fed54bf06a41f9928ad3a40000ba65d69563a669f8231169b76a17c477af9d1085f4b76e34bf182a4f8808ecef3739735feba55167f267f666c9f63
-
SSDEEP
6144:0HH0YZLefozbE+9IquXOlBQH4Oh+zmeZq6:0ntZLeAfB9IjeOh+z
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 894ba799502ca5eac58d1e82ed1c8fac99a391f1bf676beaacff5e1bbde1417b
Files
-
894ba799502ca5eac58d1e82ed1c8fac99a391f1bf676beaacff5e1bbde1417b.exe windows:5 windows x86 arch:x86
68ea79aa2f3fa0077d4466d6e381bfbe
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateJobObjectW
InterlockedCompareExchange
UnlockFile
CreateHardLinkA
GetTickCount
CreateNamedPipeW
GetNumberFormatA
GetConsoleAliasExesW
SetCommState
GlobalAlloc
LoadLibraryW
GetCalendarInfoA
SetVolumeMountPointA
GetSystemWindowsDirectoryA
GetConsoleAliasExesLengthW
SetConsoleCP
GetFileAttributesW
GetModuleFileNameW
CreateActCtxA
GetThreadPriorityBoost
VerifyVersionInfoW
GetLogicalDriveStringsA
GetCurrentDirectoryW
SetLastError
GetProcAddress
GetConsoleDisplayMode
GetProcessVersion
SetEnvironmentVariableW
CreateFileMappingW
GetNumberFormatW
CreateEventW
OpenEventA
QueryDosDeviceW
GlobalWire
EnumDateFormatsA
EnumResourceNamesA
VirtualProtect
WaitForDebugEvent
PeekConsoleInputA
GetShortPathNameW
SetProcessShutdownParameters
SetFileShortNameA
GetDiskFreeSpaceExA
ReadConsoleInputW
GetTempPathA
EnumCalendarInfoExA
LocalFree
LCMapStringW
CommConfigDialogW
HeapReAlloc
RtlUnwind
HeapSize
RaiseException
SetDefaultCommConfigW
GetCurrentProcess
SetEndOfFile
InterlockedExchangeAdd
GetLocaleInfoA
MultiByteToWideChar
GetLastError
HeapFree
HeapAlloc
GetModuleHandleW
ExitProcess
DecodePointer
GetCommandLineW
HeapSetInformation
GetStartupInfoW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
TerminateProcess
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThreadId
IsProcessorFeaturePresent
HeapCreate
WriteFile
GetStdHandle
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
Sleep
WideCharToMultiByte
GetStringTypeW
user32
LoadMenuW
CharUpperW
GetSysColor
GetMenuStringA
GetCaretPos
DrawStateA
gdi32
GetCharWidthFloatA
CreateDCW
GetCharWidth32A
GetBitmapBits
Sections
.text Size: 243KB - Virtual size: 243KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 94KB - Virtual size: 1.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 73KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ