Static task
static1
Behavioral task
behavioral1
Sample
d19e33456fc26f4993309623ea5540ec964df3ea213a869c415e87367926b885.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d19e33456fc26f4993309623ea5540ec964df3ea213a869c415e87367926b885.exe
Resource
win10v2004-20240802-en
General
-
Target
d19e33456fc26f4993309623ea5540ec964df3ea213a869c415e87367926b885
-
Size
182KB
-
MD5
d3e9a09c3e229ae5cd0f5562b679f858
-
SHA1
5d240341dcd11c3a2009e323712702d04378369d
-
SHA256
d19e33456fc26f4993309623ea5540ec964df3ea213a869c415e87367926b885
-
SHA512
3a45ecfe091b876746a2ad422af851c9fbf65a3bf915c52a79fb9fb447234f3d1dd1589706ccbf1ca45112cc93979f8667ca90e6b607815ba194205d7ae79328
-
SSDEEP
3072:UYjFNUwJTz4T9kbeKKcH0Omdm8i4dd17PwqoLBCWbU7Ex6AdkuLJ:UYjIcb9uZCEmpsWh6KkE
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d19e33456fc26f4993309623ea5540ec964df3ea213a869c415e87367926b885
Files
-
d19e33456fc26f4993309623ea5540ec964df3ea213a869c415e87367926b885.exe windows:4 windows x64 arch:x64
a4c3c8cdca800856c55f788d13471620
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
GetProcAddress
FindClose
FindNextFileW
FindFirstFileW
GetTempPathW
HeapAlloc
HeapCreate
LoadLibraryW
FreeConsole
GetCommandLineA
HeapFree
GetVersionExA
GetProcessHeap
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
RaiseException
DebugBreak
WideCharToMultiByte
MultiByteToWideChar
lstrlenA
LoadLibraryA
GetModuleHandleA
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
RtlUnwindEx
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetLastError
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
DeleteCriticalSection
FlsGetValue
TlsAlloc
FlsSetValue
TlsFree
FlsFree
SetLastError
GetCurrentThreadId
TlsSetValue
GetCurrentThread
FlsAlloc
HeapSetInformation
HeapDestroy
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
FreeLibrary
GetModuleFileNameW
VirtualQuery
LeaveCriticalSection
FatalAppExitA
EnterCriticalSection
SetConsoleCtrlHandler
InitializeCriticalSection
Sleep
GetCPInfo
GetACP
GetOEMCP
HeapSize
GetLocaleInfoA
GetLocaleInfoW
HeapReAlloc
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetDateFormatA
GetTimeFormatA
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
GetTimeZoneInformation
CompareStringA
CompareStringW
SetEnvironmentVariableA
Sections
.text Size: 128KB - Virtual size: 128KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 31KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ