Static task
static1
Behavioral task
behavioral1
Sample
7886891d37ce47fee81d35a43449a95f993506c28a4a62eed0f53bc34ccdafa7.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
7886891d37ce47fee81d35a43449a95f993506c28a4a62eed0f53bc34ccdafa7.exe
Resource
win11-20240802-en
General
-
Target
7886891d37ce47fee81d35a43449a95f993506c28a4a62eed0f53bc34ccdafa7
-
Size
388KB
-
MD5
223384c14a80b18ec277874480425963
-
SHA1
a463e8376acec28a155e77a798ddba4644e9fb5f
-
SHA256
7886891d37ce47fee81d35a43449a95f993506c28a4a62eed0f53bc34ccdafa7
-
SHA512
9a4647ece68dbb3b9c405636cbb6e33e216347b55e06c7bb3e3e6b878813c9af9dc4c60159eaae7d4898f184d1ea5b061757340ebaa5bb291bb5793cde01323f
-
SSDEEP
6144:5BQ32U/UdxXTo25OPK0Fv94o8z0TBSz91inpIdwYU4SNY2f:5+m2UdxDo2YzSopTAzTeKbSNY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7886891d37ce47fee81d35a43449a95f993506c28a4a62eed0f53bc34ccdafa7
Files
-
7886891d37ce47fee81d35a43449a95f993506c28a4a62eed0f53bc34ccdafa7.exe windows:5 windows x86 arch:x86
cc7e59ab8e5b2180a778ccad5b417493
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetEndOfFile
InterlockedIncrement
EnumCalendarInfoW
InterlockedDecrement
GetCurrentProcess
SetEnvironmentVariableW
CreateJobObjectW
SetVolumeMountPointW
UnlockFile
CreateHardLinkA
GetModuleHandleW
GetTickCount
EnumCalendarInfoExW
FindNextVolumeMountPointA
GetNumberFormatA
SetCommState
CreateActCtxW
TlsSetValue
GlobalAlloc
SetFileShortNameW
LoadLibraryW
GetCalendarInfoW
GetCalendarInfoA
CreateEventA
SetVolumeMountPointA
GetConsoleAliasExesLengthW
GetFileAttributesA
VerifyVersionInfoA
GetModuleFileNameW
GetThreadPriorityBoost
LCMapStringA
InterlockedExchange
GetConsoleAliasExesA
GetLastError
GetCurrentDirectoryW
SetLastError
GetProcAddress
CreateNamedPipeA
GetProcessVersion
CreateFileMappingW
GlobalWire
EnumDateFormatsA
VirtualProtect
OpenEventW
PeekConsoleInputA
GetShortPathNameW
SetProcessShutdownParameters
GetDiskFreeSpaceExW
ReadConsoleInputW
GetWindowsDirectoryW
DebugBreak
GetTempPathA
LocalFree
CommConfigDialogW
CloseHandle
WriteConsoleW
FlushFileBuffers
CreateFileW
GetConsoleMode
GetConsoleCP
GetLocaleInfoA
PeekNamedPipe
SetDefaultCommConfigA
GetLogicalDriveStringsA
EnumResourceNamesW
MultiByteToWideChar
HeapFree
HeapAlloc
EncodePointer
DecodePointer
GetCommandLineW
HeapSetInformation
GetStartupInfoW
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsFree
GetCurrentThreadId
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
IsProcessorFeaturePresent
HeapCreate
ExitProcess
WriteFile
GetStdHandle
Sleep
HeapSize
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
SetFilePointer
EnterCriticalSection
LeaveCriticalSection
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
WideCharToMultiByte
LCMapStringW
GetStringTypeW
RaiseException
HeapReAlloc
RtlUnwind
SetStdHandle
user32
GetMenuStringW
GetMenu
DrawStateA
LoadMenuW
GetWindowLongA
GetSysColor
GetCaretPos
CharUpperA
gdi32
GetCharWidthFloatA
CreateDCA
GetCharWidth32A
GetBkMode
Sections
.text Size: 250KB - Virtual size: 250KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 94KB - Virtual size: 32.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ziwoloc Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.taroku Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bone Size: 1024B - Virtual size: 923B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ