Static task
static1
Behavioral task
behavioral1
Sample
f691d08d4d08a092f52d63eb5a5fce0cbdeeaa042c18282c73ac5ebb627c25d3.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
f691d08d4d08a092f52d63eb5a5fce0cbdeeaa042c18282c73ac5ebb627c25d3.exe
Resource
win10v2004-20240802-en
General
-
Target
f691d08d4d08a092f52d63eb5a5fce0cbdeeaa042c18282c73ac5ebb627c25d3.exe
-
Size
403KB
-
MD5
a4bc249dc997df25a0e709eee0a0df87
-
SHA1
d4bd3dcc3c5c1bed477f3eccbf1561b4c4f9180b
-
SHA256
f691d08d4d08a092f52d63eb5a5fce0cbdeeaa042c18282c73ac5ebb627c25d3
-
SHA512
e4c12400284ea1b11c13b85c19aaf41569c40be1519adbb2d388ae1ddbb06caa7ba08898f42ce0de19640769418267908c1282c734164b3714b40541c18cce36
-
SSDEEP
6144:k2Lh2Mw6FnhZ+ObiTteTqeN1qRU1WG0S2IcNPk:kSh2JYnhoObK4MUCXi
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f691d08d4d08a092f52d63eb5a5fce0cbdeeaa042c18282c73ac5ebb627c25d3.exe
Files
-
f691d08d4d08a092f52d63eb5a5fce0cbdeeaa042c18282c73ac5ebb627c25d3.exe.exe windows:5 windows x86 arch:x86
3db609d4227cf2765fb47eb54c2d687e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetEnvironmentVariableW
CreateJobObjectW
InterlockedCompareExchange
UnlockFile
CreateHardLinkA
GetTickCount
GetNumberFormatA
GetConsoleAliasExesW
SetCommState
GlobalAlloc
LoadLibraryW
LocalShrink
GetCalendarInfoA
CreateEventA
SetVolumeMountPointA
GetSystemWindowsDirectoryA
GetConsoleAliasExesLengthW
SetConsoleCP
GetFileAttributesA
VerifyVersionInfoA
CreateActCtxA
GetThreadPriorityBoost
GetShortPathNameA
GetLogicalDriveStringsA
GetCurrentDirectoryW
SetLastError
GetProcAddress
PeekConsoleInputW
SetDefaultCommConfigW
GetProcessVersion
LoadLibraryA
InterlockedExchangeAdd
CreateFileMappingW
GetNumberFormatW
OpenEventA
QueryDosDeviceW
SetConsoleWindowInfo
GlobalWire
GetModuleFileNameA
EnumResourceNamesA
VirtualProtect
EnumDateFormatsW
SetProcessShutdownParameters
SetFileShortNameA
GetDiskFreeSpaceExA
ReadConsoleInputW
GetTempPathA
EnumCalendarInfoExA
LCMapStringW
HeapReAlloc
HeapSize
Sleep
GetStringTypeW
GetCurrentProcess
GetLocaleInfoA
SetEndOfFile
CommConfigDialogA
CreateNamedPipeA
MultiByteToWideChar
GetLastError
HeapFree
HeapAlloc
GetModuleHandleW
ExitProcess
DecodePointer
GetCommandLineW
HeapSetInformation
GetStartupInfoW
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThreadId
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
HeapCreate
WriteFile
GetStdHandle
GetModuleFileNameW
IsProcessorFeaturePresent
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
RtlUnwind
RaiseException
WideCharToMultiByte
user32
CharUpperW
GetSysColor
GetMenuStringA
GetCaretPos
LoadMenuW
gdi32
CreateDCW
GetBitmapBits
GetCharWidthFloatA
GetCharWidth32A
Sections
.text Size: 235KB - Virtual size: 235KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 94KB - Virtual size: 1.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 73KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ