Static task
static1
Behavioral task
behavioral1
Sample
c36fbe6dd8f9632176f3927fca2c2e674a5929d33e7d245f1053bf69ec2b11a9.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
c36fbe6dd8f9632176f3927fca2c2e674a5929d33e7d245f1053bf69ec2b11a9.exe
Resource
win11-20240802-en
General
-
Target
c36fbe6dd8f9632176f3927fca2c2e674a5929d33e7d245f1053bf69ec2b11a9
-
Size
379KB
-
MD5
95b628b19f244451d5f69a864e24b260
-
SHA1
a478f681098713f959d89361c09c14d02552e6ed
-
SHA256
c36fbe6dd8f9632176f3927fca2c2e674a5929d33e7d245f1053bf69ec2b11a9
-
SHA512
f2755be22ecdb5aa22ac741fd4bb4d1f1fded762106dd04e6926771ba2ceb19414228fab882b609504ece92583084634ff10b1febdcecd26ac70ac40a1aa7caa
-
SSDEEP
3072:V8XBk++uc5jv/MfYABOMHfa80LxDtamgthsGiOTBILGvmYX0ZSZn0YTwsu9f:mBknHMfYAB1aLLMhsdOdILGmM92f
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource c36fbe6dd8f9632176f3927fca2c2e674a5929d33e7d245f1053bf69ec2b11a9
Files
-
c36fbe6dd8f9632176f3927fca2c2e674a5929d33e7d245f1053bf69ec2b11a9.exe windows:5 windows x86 arch:x86
319c4580e796e2a66145d4025de853eb
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
EnumCalendarInfoW
InterlockedDecrement
GetCurrentProcess
SetDefaultCommConfigW
SetEnvironmentVariableW
CreateJobObjectW
UnlockFile
CreateHardLinkA
GetModuleHandleW
GetTickCount
FindNextVolumeMountPointA
GetNumberFormatA
SetCommState
TlsSetValue
GlobalAlloc
SetFileShortNameW
LoadLibraryW
GetCalendarInfoW
GetCalendarInfoA
CreateEventA
SetVolumeMountPointA
GetConsoleAliasExesLengthW
GetFileAttributesA
VerifyVersionInfoA
GetModuleFileNameW
CreateActCtxA
GetThreadPriorityBoost
LCMapStringA
InterlockedExchange
GetLogicalDriveStringsA
GetLastError
GetCurrentDirectoryW
InterlockedIncrement
GetProcAddress
CreateNamedPipeA
GetProcessVersion
CreateFileMappingW
GlobalWire
EnumDateFormatsA
EnumResourceNamesA
VirtualProtect
OpenEventW
PeekConsoleInputA
GetShortPathNameW
SetProcessShutdownParameters
GetDiskFreeSpaceExA
ReadConsoleInputW
GetWindowsDirectoryW
DebugBreak
GetTempPathA
EnumCalendarInfoExA
LocalFree
CommConfigDialogW
CloseHandle
WriteConsoleW
FlushFileBuffers
GetConsoleMode
CreateFileW
GetConsoleCP
SetEndOfFile
GetConsoleAliasExesA
GetLocaleInfoA
SetLastError
PeekNamedPipe
MultiByteToWideChar
HeapAlloc
EncodePointer
DecodePointer
HeapReAlloc
GetCommandLineW
HeapSetInformation
GetStartupInfoW
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsFree
GetCurrentThreadId
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
HeapFree
IsProcessorFeaturePresent
ExitProcess
WriteFile
GetStdHandle
HeapCreate
Sleep
HeapSize
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
SetFilePointer
EnterCriticalSection
LeaveCriticalSection
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
WideCharToMultiByte
LCMapStringW
GetStringTypeW
RaiseException
RtlUnwind
SetStdHandle
user32
CharUpperA
DrawStateA
LoadMenuW
GetWindowLongA
GetSysColor
GetCaretPos
SetMenu
GetMenuStringW
gdi32
GetCharWidthFloatA
CreateDCA
GetCharWidth32A
GetBkMode
Sections
.text Size: 249KB - Virtual size: 249KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 94KB - Virtual size: 32.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.puguce Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ