Static task
static1
Behavioral task
behavioral1
Sample
73d8323abf31e8a31b1f46b2a1ee9b40N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
73d8323abf31e8a31b1f46b2a1ee9b40N.exe
Resource
win10v2004-20240802-en
General
-
Target
73d8323abf31e8a31b1f46b2a1ee9b40N
-
Size
1.7MB
-
MD5
73d8323abf31e8a31b1f46b2a1ee9b40
-
SHA1
0027c8784cfb05d0528cb996bb85cfeea810c896
-
SHA256
68eacbac250be04beaae11fcf5cf09380699af92bb82dd19cc863fcfe311ff6e
-
SHA512
b7e2ff176856b7ffa95b23f2d91a6ede16307126dec174b9c7d5e7dc36f86882d587f9137747d526b31cc5cc395edfb794abf2a794f5ed89ec6f1ecab88ab1f9
-
SSDEEP
3072:0xZuqr83iLFnmMEaTFw24CU1PuFiDocENyqteVQPPqC0VUjo0Ko:07uK83izvTOp1Pu8DK3PPyW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 73d8323abf31e8a31b1f46b2a1ee9b40N
Files
-
73d8323abf31e8a31b1f46b2a1ee9b40N.exe windows:6 windows x64 arch:x64
219a9121baf83fffa39a835df7f9e5e8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
UnmapViewOfFile
GetModuleHandleW
InitializeCriticalSection
OpenProcess
GlobalAlloc
LoadLibraryW
Sleep
LeaveCriticalSection
TerminateProcess
lstrcmpW
lstrlenW
GetLastError
GetProcAddress
EnterCriticalSection
GlobalFree
FindClose
Process32FirstW
LocalAlloc
Process32NextW
OpenFileMappingW
FindNextFileW
CreateToolhelp32Snapshot
DeleteCriticalSection
MapViewOfFile
GetWindowsDirectoryW
DeleteFileW
CreateThread
ReadFile
CreateFileW
FlushFileBuffers
WriteConsoleW
SetStdHandle
HeapReAlloc
HeapSize
SetFilePointerEx
GetConsoleMode
GetConsoleCP
LCMapStringW
GetStringTypeW
FindFirstFileW
OutputDebugStringW
CloseHandle
LoadLibraryExW
RtlUnwindEx
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
GetCurrentProcess
HeapFree
HeapAlloc
GetCommandLineA
IsDebuggerPresent
IsProcessorFeaturePresent
GetProcessHeap
EncodePointer
DecodePointer
ExitProcess
GetModuleHandleExW
MultiByteToWideChar
GetStdHandle
WriteFile
GetModuleFileNameW
RtlPcToFileHeader
RaiseException
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
SetLastError
GetCurrentThreadId
GetFileType
InitializeCriticalSectionAndSpinCount
GetStartupInfoW
GetModuleFileNameA
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
WideCharToMultiByte
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
VirtualAlloc
user32
LoadCursorW
DispatchMessageW
DefWindowProcW
GetSystemMetrics
DestroyWindow
SetTimer
GetMessageW
UnhookWindowsHookEx
wvsprintfW
UnregisterClassW
KillTimer
PostQuitMessage
CallNextHookEx
FindWindowW
TranslateMessage
RegisterClassExW
CreateWindowExW
SetWindowsHookExW
advapi32
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
ole32
PropVariantClear
CoCreateInstance
CoUninitialize
CoInitialize
setupapi
SetupDiGetClassDevsW
SetupDiEnumDeviceInfo
SetupDiDestroyDeviceInfoList
SetupDiGetDeviceRegistryPropertyW
SetupDiGetDeviceInstanceIdW
Sections
.text Size: 89KB - Virtual size: 89KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 37KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 67KB - Virtual size: 79KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ