Static task
static1
Behavioral task
behavioral1
Sample
beb564417bef572950ed6c6b07adf0f8e6066d5bacdb9eb3c2edc9aa5b168800.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
beb564417bef572950ed6c6b07adf0f8e6066d5bacdb9eb3c2edc9aa5b168800.exe
Resource
win10v2004-20240802-en
General
-
Target
beb564417bef572950ed6c6b07adf0f8e6066d5bacdb9eb3c2edc9aa5b168800
-
Size
768KB
-
MD5
e6c95ec36afc3c47cb71ee2d1ffa7c6a
-
SHA1
0aad4e700473257c953032c2e0e57a2efaf14fee
-
SHA256
beb564417bef572950ed6c6b07adf0f8e6066d5bacdb9eb3c2edc9aa5b168800
-
SHA512
38cdd7e5827e080970d47c1ee9cc764b79c57e51603c55fcc05bb687f09e7a72c2dd7a1a0166b03cb861196e842f43c2344df42437ef64df6fa5aa9963d33e18
-
SSDEEP
12288:Ec8XbKao+DN1HdlMmB5+m11GYmDVxRu8/QKh41wZ:MLKHg3HHXqCkxDV2uQ0mwZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource beb564417bef572950ed6c6b07adf0f8e6066d5bacdb9eb3c2edc9aa5b168800
Files
-
beb564417bef572950ed6c6b07adf0f8e6066d5bacdb9eb3c2edc9aa5b168800.exe windows:4 windows x86 arch:x86
e9a89f1214fa91b207c86373a9fbab47
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateEventA
GetProcAddress
TlsSetValue
GetModuleHandleA
VirtualAlloc
CreateSemaphoreA
Sleep
WaitForMultipleObjects
GetLastError
VirtualProtectEx
ResetEvent
GetFileAttributesA
GetTickCount
TerminateThread
ExitProcess
GetProcessHeap
VirtualQuery
GetSystemInfo
VirtualProtect
RtlUnwind
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
HeapSize
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
LCMapStringW
GetStartupInfoA
GetCommandLineA
GetVersionExA
HeapFree
HeapAlloc
TerminateProcess
GetCurrentProcess
WriteFile
GetStdHandle
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
TlsFree
SetLastError
GetCurrentThreadId
TlsGetValue
TlsAlloc
HeapDestroy
HeapCreate
VirtualFree
LeaveCriticalSection
EnterCriticalSection
HeapReAlloc
LoadLibraryA
GetACP
GetOEMCP
GetCPInfo
InitializeCriticalSection
LCMapStringA
MultiByteToWideChar
user32
IsIconic
LoadCursorA
ShowWindow
GetTopWindow
PostMessageA
GetDC
DestroyWindow
GetLastActivePopup
gdiplus
GdipCloneBrush
GdipCreateSolidFill
GdipAlloc
GdipFree
GdipCreateFromHDC
GdipDeleteGraphics
GdipCreateFontFamilyFromName
GdipDeleteFontFamily
GdipCreateFont
GdipDeleteFont
GdipDeleteBrush
msacm32
acmStreamClose
Sections
.text Size: 28KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 244KB - Virtual size: 757KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 164KB - Virtual size: 163KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.shell Size: 320KB - Virtual size: 320KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ