Static task
static1
Behavioral task
behavioral1
Sample
1c82f652fa81805f2066cd73225f1b75f0e42cebc462eb6364da69d3e799a314.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
1c82f652fa81805f2066cd73225f1b75f0e42cebc462eb6364da69d3e799a314.exe
Resource
win10v2004-20240802-en
General
-
Target
1c82f652fa81805f2066cd73225f1b75f0e42cebc462eb6364da69d3e799a314
-
Size
768KB
-
MD5
8abb6886fc881a9dd17e78299b4ad77f
-
SHA1
3f55506dc508c4bfe87caec36f417dd7ea5a8230
-
SHA256
1c82f652fa81805f2066cd73225f1b75f0e42cebc462eb6364da69d3e799a314
-
SHA512
78fac596c81ccc969807419ae3c719729345c873992c06cf90f4ce01c61517c42e0ed192baa8a5f6a639f7894b599fb1727aa65fd2b12a4b2b3a86a3c66e92f2
-
SSDEEP
12288:9oIFXbKao+DN1HdlMmB5+m11GYmDVxRu8/QKh41wZ:/LKHg3HHXqCkxDV2uQ0mwZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1c82f652fa81805f2066cd73225f1b75f0e42cebc462eb6364da69d3e799a314
Files
-
1c82f652fa81805f2066cd73225f1b75f0e42cebc462eb6364da69d3e799a314.exe windows:4 windows x86 arch:x86
e9a89f1214fa91b207c86373a9fbab47
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateEventA
GetProcAddress
TlsSetValue
GetModuleHandleA
VirtualAlloc
CreateSemaphoreA
Sleep
WaitForMultipleObjects
GetLastError
VirtualProtectEx
ResetEvent
GetFileAttributesA
GetTickCount
TerminateThread
ExitProcess
GetProcessHeap
VirtualQuery
GetSystemInfo
VirtualProtect
RtlUnwind
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
HeapSize
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
LCMapStringW
GetStartupInfoA
GetCommandLineA
GetVersionExA
HeapFree
HeapAlloc
TerminateProcess
GetCurrentProcess
WriteFile
GetStdHandle
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
TlsFree
SetLastError
GetCurrentThreadId
TlsGetValue
TlsAlloc
HeapDestroy
HeapCreate
VirtualFree
LeaveCriticalSection
EnterCriticalSection
HeapReAlloc
LoadLibraryA
GetACP
GetOEMCP
GetCPInfo
InitializeCriticalSection
LCMapStringA
MultiByteToWideChar
user32
IsIconic
LoadCursorA
ShowWindow
GetTopWindow
PostMessageA
GetDC
DestroyWindow
GetLastActivePopup
gdiplus
GdipCloneBrush
GdipCreateSolidFill
GdipAlloc
GdipFree
GdipCreateFromHDC
GdipDeleteGraphics
GdipCreateFontFamilyFromName
GdipDeleteFontFamily
GdipCreateFont
GdipDeleteFont
GdipDeleteBrush
msacm32
acmStreamClose
Sections
.text Size: 28KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 244KB - Virtual size: 757KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 164KB - Virtual size: 163KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.shell Size: 320KB - Virtual size: 320KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ