Static task
static1
Behavioral task
behavioral1
Sample
513266fb23782f2bff65b6e8f059c4f4bb99562610c44110c4a463338f91d425.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
513266fb23782f2bff65b6e8f059c4f4bb99562610c44110c4a463338f91d425.exe
Resource
win10v2004-20240802-en
General
-
Target
513266fb23782f2bff65b6e8f059c4f4bb99562610c44110c4a463338f91d425
-
Size
477KB
-
MD5
e931ab5882d62ea08e498d90e2e11ad0
-
SHA1
5b68fe6556752d6bf077740d1b297f65a2673b54
-
SHA256
513266fb23782f2bff65b6e8f059c4f4bb99562610c44110c4a463338f91d425
-
SHA512
f12285f65854fbce23b6c4fee6ef662cb61d65b874f17347494c1d0c9984c24acb4c1d703d7821b482864e271d08ccfce73e40a4cff9112d9907fea527ab6042
-
SSDEEP
3072:/NV+7SXjtEjDg/s6L7h/gT72ZywWWq/ePVl/uw7cFh:/TwSXNUQmkWWjzcF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 513266fb23782f2bff65b6e8f059c4f4bb99562610c44110c4a463338f91d425
Files
-
513266fb23782f2bff65b6e8f059c4f4bb99562610c44110c4a463338f91d425.exe windows:5 windows x86 arch:x86
1e6318700f802c378fd14ed1b841cb32
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindNextFileW
FindClose
CreateFileW
GetFileAttributesW
SetFileAttributesW
GetLastError
LoadLibraryW
GetProcAddress
lstrcmpW
GetCurrentThreadId
GetCurrentProcessId
SystemTimeToFileTime
GetSystemTimeAsFileTime
GetSystemTime
QueryPerformanceCounter
GetCommandLineW
GetCurrentProcess
lstrlenW
SetErrorMode
CreateMutexW
lstrcatA
GetModuleHandleA
GetLogicalDriveStringsW
CreateToolhelp32Snapshot
Process32NextW
Process32FirstW
LocalFree
FindFirstFileW
lstrcmpiW
OpenMutexW
GetDriveTypeW
HeapSize
FlushFileBuffers
WriteConsoleW
GetStringTypeW
SetStdHandle
GetProcessHeap
HeapAlloc
HeapReAlloc
HeapFree
MoveFileW
GetTickCount
lstrcpyW
SetFilePointerEx
CloseHandle
InterlockedExchangeAdd
lstrcatW
Sleep
QueueUserWorkItem
lstrcpynW
WriteFile
GetFileSizeEx
FreeEnvironmentStringsW
GetEnvironmentStringsW
DecodePointer
GetCommandLineA
GetCPInfo
GetOEMCP
IsValidCodePage
FindNextFileA
FindFirstFileExA
LCMapStringW
GetFileType
ExitProcess
ReadFile
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
SetEvent
ResetEvent
WaitForSingleObjectEx
CreateEventW
GetModuleHandleW
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
InitializeSListHead
TerminateProcess
RtlUnwind
RaiseException
SetLastError
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
GetModuleHandleExW
GetModuleFileNameA
MultiByteToWideChar
WideCharToMultiByte
GetStdHandle
GetACP
GetConsoleCP
GetConsoleMode
user32
CharLowerW
wsprintfW
shell32
ShellExecuteW
SHEmptyRecycleBinA
CommandLineToArgvW
ole32
CoSetProxyBlanket
CoCreateInstance
oleaut32
VariantClear
SysAllocString
SysFreeString
VariantInit
shlwapi
PathRemoveBackslashW
StrStrW
StrRStrIW
StrStrIW
wnsprintfA
wnsprintfW
mpr
WNetEnumResourceW
WNetCloseEnum
WNetOpenEnumW
Sections
.text Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 77KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.shell Size: 320KB - Virtual size: 320KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ