Static task
static1
Behavioral task
behavioral1
Sample
baf9eb9052731d46930592abd8ff757adf3da5aba9e20e5f7c5ef140149354a8.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
baf9eb9052731d46930592abd8ff757adf3da5aba9e20e5f7c5ef140149354a8.exe
Resource
win11-20240802-en
General
-
Target
baf9eb9052731d46930592abd8ff757adf3da5aba9e20e5f7c5ef140149354a8
-
Size
275KB
-
MD5
b4a28a6b0c4653dff8580e578eccc92f
-
SHA1
a6c068e575cce98862222fc1650b6000670a37c4
-
SHA256
baf9eb9052731d46930592abd8ff757adf3da5aba9e20e5f7c5ef140149354a8
-
SHA512
790d7c739e329256bbc0ca295da7f97ccaba8e547610696a54d209264af9948abb28c4fc3db20d21032b17a4cead28c97cf83f7de38e75599010cb00e357ed24
-
SSDEEP
6144:OeCJ/c3ekaDJWGEPSFx/1/XGCyZPro69M0:OxJsenDJW1Yxt1yZPro6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource baf9eb9052731d46930592abd8ff757adf3da5aba9e20e5f7c5ef140149354a8
Files
-
baf9eb9052731d46930592abd8ff757adf3da5aba9e20e5f7c5ef140149354a8.exe windows:5 windows x86 arch:x86
b85aa50ca7d1a6cf636697bf99d745ed
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetNumaNodeProcessorMask
GetConsoleAliasesLengthW
CopyFileExW
GetNumaProcessorNode
InterlockedDecrement
QueryDosDeviceA
GetUserDefaultLCID
CallNamedPipeW
FreeEnvironmentStringsA
GetModuleHandleW
GetCommandLineA
GetPriorityClass
GetEnvironmentStrings
LoadLibraryW
GetConsoleMode
CopyFileW
GetConsoleAliasExesLengthW
WriteConsoleOutputA
HeapDestroy
GetFileAttributesA
GlobalFlags
GetBinaryTypeA
GetStartupInfoW
SetConsoleTitleA
DisconnectNamedPipe
GetShortPathNameA
GetComputerNameA
GetConsoleAliasesW
FillConsoleOutputCharacterW
GetLastError
GetProcAddress
SetStdHandle
EnterCriticalSection
SearchPathA
LoadLibraryA
OpenWaitableTimerW
LocalAlloc
WritePrivateProfileStringA
FoldStringA
GetModuleFileNameA
GetDefaultCommConfigA
BuildCommDCBA
WaitForDebugEvent
SetCalendarInfoA
FindAtomW
GlobalReAlloc
SetFileAttributesW
GetVolumeInformationW
WriteConsoleW
CloseHandle
CreateDirectoryA
DebugActiveProcess
EncodePointer
DecodePointer
MultiByteToWideChar
GetCommandLineW
HeapSetInformation
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
ReadFile
LeaveCriticalSection
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
Sleep
HeapSize
ExitProcess
GetCPInfo
InterlockedIncrement
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
WriteFile
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapCreate
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
SetFilePointer
HeapFree
RtlUnwind
HeapReAlloc
WideCharToMultiByte
LCMapStringW
GetStringTypeW
IsProcessorFeaturePresent
GetConsoleCP
FlushFileBuffers
CreateFileW
user32
GetUserObjectInformationA
advapi32
RegCreateKeyA
Sections
.text Size: 133KB - Virtual size: 132KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 35.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 123KB - Virtual size: 123KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ