Static task
static1
Behavioral task
behavioral1
Sample
c076f935f629d2049e2cdc80ce6c4bdfd5a240f69bc573d891ce24c8af4e8bc5.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
c076f935f629d2049e2cdc80ce6c4bdfd5a240f69bc573d891ce24c8af4e8bc5.exe
Resource
win11-20240802-en
General
-
Target
c076f935f629d2049e2cdc80ce6c4bdfd5a240f69bc573d891ce24c8af4e8bc5
-
Size
297KB
-
MD5
ec731618d44bd361123e9ff1841a9453
-
SHA1
9f8134025847f5e7662ff3801bf023f34d032daf
-
SHA256
c076f935f629d2049e2cdc80ce6c4bdfd5a240f69bc573d891ce24c8af4e8bc5
-
SHA512
583bd35d11f8fdb6875bafbd028e425735b7160cd0b3c8e6db8bbf3056ec29a0e550c27174d8c2d1ac0c3c9e01aed8f2d62e9cff7ae18be135b8974a4b2b1a24
-
SSDEEP
6144:GxxarQgBPCHrIZk5kzdC2avTu9ymaWCeQdRfaHgo2TWF:wlgBPC+Y6phrCe9Hgo2a
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c076f935f629d2049e2cdc80ce6c4bdfd5a240f69bc573d891ce24c8af4e8bc5
Files
-
c076f935f629d2049e2cdc80ce6c4bdfd5a240f69bc573d891ce24c8af4e8bc5.exe windows:6 windows x64 arch:x64
c478dfc3cc2e2740e5b3787e636a4c6e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
user32
SendInput
wsprintfA
ole32
CoUninitialize
CoInitialize
CoCreateInstance
oleaut32
VariantClear
wininet
InternetReadFile
InternetCloseHandle
InternetOpenUrlW
InternetOpenW
HttpQueryInfoA
shell32
SHGetFolderPathA
SHGetFolderPathW
advapi32
RegCloseKey
RegOpenKeyExW
RegOpenKeyExA
RegDeleteKeyW
RegSetValueExA
GetTokenInformation
GetUserNameW
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegSetValueExW
shlwapi
PathFindFileNameW
kernel32
SetFilePointerEx
InitOnceExecuteOnce
FlushFileBuffers
GetModuleHandleW
GetStartupInfoW
FlsFree
GetConsoleCP
GetConsoleMode
QueryPerformanceCounter
GetTickCount64
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetUserDefaultLocaleName
LCMapStringEx
IsValidLocaleName
EnumSystemLocalesEx
HeapReAlloc
LoadLibraryExW
OutputDebugStringW
ReadConsoleW
SetStdHandle
WriteConsoleW
GetFileType
CopyFileA
FlsSetValue
FlsGetValue
FlsAlloc
GetThreadContext
GetTempFileNameW
GetFileSize
SetThreadContext
SetFilePointer
FreeLibrary
GetCurrentProcess
WaitForSingleObject
WriteFile
OpenProcess
GetSystemDirectoryW
LoadLibraryW
GetModuleFileNameW
CreateFileW
GetTempPathW
GetLastError
GetProcAddress
VirtualAllocEx
LoadLibraryA
GetModuleHandleA
Wow64SetThreadContext
CloseHandle
WriteProcessMemory
ResumeThread
Wow64GetThreadContext
CreateThread
HeapAlloc
GetProcessHeap
Sleep
Process32First
CreateRemoteThread
Process32Next
CreateToolhelp32Snapshot
VirtualProtectEx
ExitProcess
GetFileAttributesA
GetModuleFileNameA
LocalFree
FindFirstFileW
MapViewOfFile
UnmapViewOfFile
SetEndOfFile
CreateProcessW
CompareFileTime
VirtualFree
GetWindowsDirectoryA
GetProcessTimes
GetVolumeInformationA
CopyFileW
TerminateProcess
ReadFile
lstrcatA
MultiByteToWideChar
CreateDirectoryA
VirtualAlloc
SetFileAttributesA
FindClose
Process32FirstW
CreateFileMappingA
IsWow64Process
Process32NextW
CreateMutexA
IsDebuggerPresent
FindNextFileW
DeleteFileW
SetFileAttributesW
ExpandEnvironmentStringsW
WideCharToMultiByte
GetStringTypeW
EncodePointer
DecodePointer
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
GetLocaleInfoEx
HeapFree
IsProcessorFeaturePresent
GetCPInfo
GetSystemTimeAsFileTime
GetCommandLineW
RtlLookupFunctionEntry
RtlUnwindEx
RtlPcToFileHeader
RaiseException
InitializeCriticalSectionAndSpinCount
IsValidCodePage
GetACP
GetOEMCP
SetLastError
GetCurrentThreadId
GetModuleHandleExW
GetStdHandle
HeapSize
RtlCaptureContext
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
Sections
.text Size: 139KB - Virtual size: 138KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 59KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 83KB - Virtual size: 93KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 824B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ