Static task
static1
Behavioral task
behavioral1
Sample
a8264147bc22a02d977fa5d57b3169ccbc313dc35ba2b788da0cb7dce84f0b02.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
a8264147bc22a02d977fa5d57b3169ccbc313dc35ba2b788da0cb7dce84f0b02.exe
Resource
win10v2004-20240802-en
General
-
Target
a8264147bc22a02d977fa5d57b3169ccbc313dc35ba2b788da0cb7dce84f0b02
-
Size
190KB
-
MD5
62947f28aedffbba7b8424fa764d33ac
-
SHA1
baca398418a7e83b07ae924694897428660f936a
-
SHA256
a8264147bc22a02d977fa5d57b3169ccbc313dc35ba2b788da0cb7dce84f0b02
-
SHA512
5be7ecc2c6ec5056cc9db02fb0e8f694154a55bafa96f2943ead5c2b0730ddbcb82739ea6b2769fb93fee62bc15a9b2bc30de24d90dcc40cc64be6186f2b9279
-
SSDEEP
3072:aH+lBBpz9/vh9yx37T/xvyNvypa7spopsUyqpr3xFbQ:nBpz9/vh9yxrbxvyN/pdJtz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource a8264147bc22a02d977fa5d57b3169ccbc313dc35ba2b788da0cb7dce84f0b02
Files
-
a8264147bc22a02d977fa5d57b3169ccbc313dc35ba2b788da0cb7dce84f0b02.exe windows:5 windows x86 arch:x86
4f367ac621adeab4fe7fbfb9dbd8862f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetComputerNameA
FillConsoleOutputCharacterA
GetNumaProcessorNode
DebugActiveProcessStop
GetDefaultCommConfigW
CallNamedPipeA
WriteConsoleOutputW
HeapAlloc
GlobalSize
GetEnvironmentStringsW
CreateDirectoryW
GetComputerNameW
GetSystemDefaultLCID
GetModuleHandleW
GetConsoleAliasesLengthA
GetCommandLineA
GetSystemTimes
GlobalAlloc
LoadLibraryW
GetConsoleAliasExesLengthW
LeaveCriticalSection
SetConsoleMode
GetFileAttributesW
SetConsoleTitleA
GetShortPathNameA
InterlockedExchange
GetStartupInfoA
GetLastError
GetProcAddress
SetStdHandle
SearchPathA
BuildCommDCBW
GetNumaHighestNodeNumber
LoadLibraryA
UnhandledExceptionFilter
InterlockedExchangeAdd
WritePrivateProfileStringA
QueryDosDeviceW
VirtualLock
FoldStringW
GetModuleFileNameA
FreeEnvironmentStringsW
FindAtomW
CopyFileExA
SetFilePointer
WriteConsoleW
MultiByteToWideChar
EncodePointer
DecodePointer
ExitProcess
HeapSetInformation
GetStartupInfoW
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
WriteFile
GetStdHandle
GetModuleFileNameW
HeapCreate
EnterCriticalSection
Sleep
HeapSize
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
WideCharToMultiByte
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LCMapStringW
GetStringTypeW
HeapFree
RtlUnwind
HeapReAlloc
IsProcessorFeaturePresent
GetConsoleCP
GetConsoleMode
FlushFileBuffers
ReadFile
CloseHandle
CreateFileW
user32
GetUserObjectInformationW
Sections
.text Size: 102KB - Virtual size: 101KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 69KB - Virtual size: 69KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ