Static task
static1
Behavioral task
behavioral1
Sample
95421497e3e6ca2165ab17bb6407cc64f90408a90e1c4c519f6564ca5506c727.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
95421497e3e6ca2165ab17bb6407cc64f90408a90e1c4c519f6564ca5506c727.exe
Resource
win11-20240802-en
General
-
Target
95421497e3e6ca2165ab17bb6407cc64f90408a90e1c4c519f6564ca5506c727
-
Size
284KB
-
MD5
34d76e02ad335b3e6406baa55aa0744f
-
SHA1
39ae78c1690117bfdcfd5d5bf2c8bef75feee39c
-
SHA256
95421497e3e6ca2165ab17bb6407cc64f90408a90e1c4c519f6564ca5506c727
-
SHA512
b93c6a5024c67efbeee7f75a198e72af8501995fe29e2b12b41406ae1c8770d40671cb6e0b949bc52c76031acd3e6d651619d2498ae79b0140f60b139516e3e6
-
SSDEEP
6144:Mo8wbEhj+FYosMddIaC0xEfjg6R6vQ7uW:Mo7bEhyKod6F0xEf0HvQB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 95421497e3e6ca2165ab17bb6407cc64f90408a90e1c4c519f6564ca5506c727
Files
-
95421497e3e6ca2165ab17bb6407cc64f90408a90e1c4c519f6564ca5506c727.exe windows:5 windows x86 arch:x86
1d1ec441fe0c255b7bd79f009a10a8a3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetComputerNameA
SearchPathW
SetPriorityClass
GetNumaProcessorNode
GetConsoleAliasExesLengthA
InterlockedIncrement
OpenJobObjectA
QueryDosDeviceA
GetComputerNameW
CallNamedPipeW
FreeEnvironmentStringsA
GetModuleHandleW
GetTickCount
GetConsoleAliasesLengthA
GetUserDefaultLangID
GetEnvironmentStrings
LoadLibraryW
GetConsoleMode
Sleep
CopyFileW
WriteConsoleOutputA
HeapDestroy
GetFileAttributesA
GlobalFlags
GetModuleFileNameW
GetBinaryTypeW
GetStartupInfoW
WritePrivateProfileStringW
DisconnectNamedPipe
GetCommandLineW
GetConsoleAliasesW
FillConsoleOutputCharacterW
GetLastError
GetProcAddress
SetStdHandle
EnterCriticalSection
SearchPathA
BuildCommDCBW
InterlockedExchangeAdd
OpenWaitableTimerW
LocalAlloc
FoldStringW
GetModuleFileNameA
GetDefaultCommConfigA
SetConsoleTitleW
GetModuleHandleA
GetShortPathNameW
SetCalendarInfoA
FindAtomW
GlobalReAlloc
SetFileAttributesW
CopyFileExA
GetVolumeInformationW
CreateFileW
SetFilePointer
CloseHandle
CreateDirectoryA
DebugActiveProcess
HeapAlloc
EncodePointer
DecodePointer
MultiByteToWideChar
HeapSetInformation
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
ExitProcess
WriteFile
GetStdHandle
HeapCreate
HeapSize
GetCPInfo
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
LeaveCriticalSection
HeapReAlloc
RtlUnwind
WideCharToMultiByte
LCMapStringW
GetStringTypeW
HeapFree
IsProcessorFeaturePresent
GetConsoleCP
FlushFileBuffers
WriteConsoleW
user32
SetFocus
GetUserObjectInformationA
advapi32
RegCreateKeyA
Sections
.text Size: 130KB - Virtual size: 129KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 35.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 135KB - Virtual size: 135KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ