Static task
static1
Behavioral task
behavioral1
Sample
464822a16049367cfdd70e52770123b955206579e9b65206101a7d41784f4a1b.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
464822a16049367cfdd70e52770123b955206579e9b65206101a7d41784f4a1b.exe
Resource
win10v2004-20240802-en
General
-
Target
464822a16049367cfdd70e52770123b955206579e9b65206101a7d41784f4a1b.exe
-
Size
388KB
-
MD5
21599b8f6b9d799a51c9fc99f8fb756f
-
SHA1
fbf2188e672ad3596354d2d32357535d4b79eac2
-
SHA256
464822a16049367cfdd70e52770123b955206579e9b65206101a7d41784f4a1b
-
SHA512
44bebbb8a610b18a9380892a97fcb7a496371a0d834aaf72bcf4d22bc22fb4b6d4d5b3fd9d8578f8fbb993cb654bd95550c3ae191f2e746654546929ea426998
-
SSDEEP
6144:DFdO2+enttkIK8g+trNviXl0BkCQti3j+tymVCYf:D/F9ttkIK8Z/g0ljj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 464822a16049367cfdd70e52770123b955206579e9b65206101a7d41784f4a1b.exe
Files
-
464822a16049367cfdd70e52770123b955206579e9b65206101a7d41784f4a1b.exe.exe windows:5 windows x86 arch:x86
ffb70553c166fb8a7314a9878c48b5f9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetEndOfFile
InterlockedIncrement
EnumCalendarInfoW
InterlockedDecrement
GetCurrentProcess
SetEnvironmentVariableW
CreateJobObjectW
SetVolumeMountPointW
UnlockFile
CreateHardLinkA
GetModuleHandleW
GetTickCount
EnumCalendarInfoExW
FindNextVolumeMountPointA
GetNumberFormatA
SetCommState
CreateActCtxW
TlsSetValue
GlobalAlloc
SetFileShortNameW
LoadLibraryW
GetCalendarInfoW
GetCalendarInfoA
CreateEventA
SetVolumeMountPointA
GetConsoleAliasExesLengthW
GetFileAttributesA
VerifyVersionInfoA
GetModuleFileNameW
GetThreadPriorityBoost
LCMapStringA
InterlockedExchange
GetConsoleAliasExesA
GetLastError
GetCurrentDirectoryW
SetLastError
GetProcAddress
CreateNamedPipeA
GetProcessVersion
CreateFileMappingW
GlobalWire
EnumDateFormatsA
VirtualProtect
OpenEventW
PeekConsoleInputA
GetShortPathNameW
SetProcessShutdownParameters
GetDiskFreeSpaceExW
ReadConsoleInputW
GetWindowsDirectoryW
DebugBreak
GetTempPathA
LocalFree
CommConfigDialogW
CloseHandle
WriteConsoleW
FlushFileBuffers
CreateFileW
GetConsoleMode
GetConsoleCP
GetLocaleInfoA
PeekNamedPipe
SetDefaultCommConfigA
GetLogicalDriveStringsA
EnumResourceNamesW
MultiByteToWideChar
HeapFree
HeapAlloc
EncodePointer
DecodePointer
GetCommandLineW
HeapSetInformation
GetStartupInfoW
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsFree
GetCurrentThreadId
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
IsProcessorFeaturePresent
HeapCreate
ExitProcess
WriteFile
GetStdHandle
Sleep
HeapSize
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
SetFilePointer
EnterCriticalSection
LeaveCriticalSection
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
WideCharToMultiByte
LCMapStringW
GetStringTypeW
RaiseException
HeapReAlloc
RtlUnwind
SetStdHandle
user32
CharUpperA
DrawStateA
LoadMenuW
GetWindowLongA
GetSysColor
GetMenuStringA
GetCaretPos
GetMenu
gdi32
GetCharWidthFloatA
CreateDCA
GetCharWidth32A
GetBkMode
Sections
.text Size: 251KB - Virtual size: 250KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 94KB - Virtual size: 32.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.lagufix Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.wun Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.kari Size: 1024B - Virtual size: 923B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 33KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ