Static task
static1
Behavioral task
behavioral1
Sample
c0da3ea4d016ecf84a11d0b73c7b1cdcfef31391cf58c6591cd927acae83372e.exe
Resource
win10v2004-20240802-en
General
-
Target
c0da3ea4d016ecf84a11d0b73c7b1cdcfef31391cf58c6591cd927acae83372e
-
Size
295KB
-
MD5
f82c9413e07313056c13db265b4ff06d
-
SHA1
80c856b004083ebe777a7c4030d247d26cd7dc40
-
SHA256
c0da3ea4d016ecf84a11d0b73c7b1cdcfef31391cf58c6591cd927acae83372e
-
SHA512
3accbff6cc6f3fd95a14a687920aad9053fdcf01bebc911b975fa5b718b685bb88cc5a7efcb05ab7b7f7e74d358d0728ecc0478ddc5b5d8b1455619e6c8eb921
-
SSDEEP
6144:U6VyfXc9rZniLw7BUDJ5/kDQwgxAu/w/Q:U9XurZniemXwgxAuY/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c0da3ea4d016ecf84a11d0b73c7b1cdcfef31391cf58c6591cd927acae83372e
Files
-
c0da3ea4d016ecf84a11d0b73c7b1cdcfef31391cf58c6591cd927acae83372e.exe windows:5 windows x86 arch:x86
f5c87d796889e88604948d41c98c5353
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DebugActiveProcess
GetComputerNameA
SearchPathW
GetConsoleAliasesLengthW
CopyFileExW
GetNumaProcessorNode
WriteConsoleOutputW
HeapAlloc
InterlockedIncrement
GlobalSize
CreateDirectoryW
GetSystemDefaultLCID
CallNamedPipeW
GetModuleHandleW
GetCommandLineA
GetSystemTimes
GetEnvironmentStrings
LoadLibraryW
GetConsoleAliasExesLengthW
SetConsoleMode
GetFileAttributesW
GetBinaryTypeA
GetShortPathNameA
InterlockedExchange
GetStartupInfoA
FillConsoleOutputCharacterW
GetLastError
GetProcAddress
CopyFileA
SetStdHandle
EnterCriticalSection
BuildCommDCBW
GetNumaHighestNodeNumber
OpenWaitableTimerA
UnhandledExceptionFilter
LocalAlloc
WritePrivateProfileStringA
QueryDosDeviceW
VirtualLock
FindAtomA
FoldStringA
GetModuleFileNameA
GetDefaultCommConfigA
SetConsoleTitleW
FreeEnvironmentStringsW
SetCalendarInfoA
SetFileAttributesW
WriteConsoleW
CloseHandle
MultiByteToWideChar
EncodePointer
DecodePointer
ExitProcess
GetCommandLineW
HeapSetInformation
GetStartupInfoW
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
LeaveCriticalSection
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
Sleep
HeapSize
WriteFile
GetModuleFileNameW
GetEnvironmentStringsW
HeapCreate
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
WideCharToMultiByte
LCMapStringW
GetStringTypeW
HeapFree
RtlUnwind
ReadFile
HeapReAlloc
IsProcessorFeaturePresent
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetFilePointer
CreateFileW
user32
GetUserObjectInformationW
Sections
.text Size: 159KB - Virtual size: 158KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 39.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 116KB - Virtual size: 116KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ