Static task
static1
Behavioral task
behavioral1
Sample
b05849c6f8fcf832ab022e1ee07189f6b1e6040e1724d9a8e5d1154c99738fda.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b05849c6f8fcf832ab022e1ee07189f6b1e6040e1724d9a8e5d1154c99738fda.exe
Resource
win10v2004-20240802-en
General
-
Target
b05849c6f8fcf832ab022e1ee07189f6b1e6040e1724d9a8e5d1154c99738fda
-
Size
131KB
-
MD5
959ceaeef929fcabe04ab18fb00a80bd
-
SHA1
3429ff662f2622266d53ddb569677f06f3156af7
-
SHA256
b05849c6f8fcf832ab022e1ee07189f6b1e6040e1724d9a8e5d1154c99738fda
-
SHA512
25e085c1816a34686c15e6cfc028a27e4cdae71a3bb21cdaafcf2c69e058d5beb74dc2edfa484596884c51a05042da0e49c63462d0bb32a16fe3a28f84f81d49
-
SSDEEP
1536:tICSGEfn05I7LyK8+jwQP+57WJ5YxLMoQEqsY1ByRmCrGrJCMe7uHfPbZV:3+05I7LyJaHP+04ATEm1BbNCMe7APF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b05849c6f8fcf832ab022e1ee07189f6b1e6040e1724d9a8e5d1154c99738fda
Files
-
b05849c6f8fcf832ab022e1ee07189f6b1e6040e1724d9a8e5d1154c99738fda.exe windows:4 windows x64 arch:x64
80c0b9e005cbd945d3b2f2aec12ee7e6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
GetTokenInformation
OpenProcessToken
kernel32
CloseHandle
CreateFileW
CreateMutexA
DeleteCriticalSection
EnterCriticalSection
ExitProcess
FreeLibrary
GetCommandLineW
GetCurrentProcess
GetCurrentThreadId
GetFileType
GetLastError
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleExW
GetNativeSystemInfo
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetStdHandle
GetThreadLocale
GlobalAlloc
HeapAlloc
HeapFree
InitializeCriticalSection
IsBadReadPtr
IsDBCSLeadByteEx
LeaveCriticalSection
LoadLibraryA
LoadLibraryW
LocalAlloc
LocalFree
MultiByteToWideChar
RaiseException
ReadFile
RtlAddFunctionTable
SetConsoleCtrlHandler
SetErrorMode
SetFilePointer
SetLastError
SetUnhandledExceptionFilter
Sleep
TlsGetValue
VirtualAlloc
VirtualFree
VirtualProtect
VirtualQuery
WideCharToMultiByte
WriteConsoleA
lstrlenA
msvcrt
__C_specific_handler
___lc_codepage_func
___mb_cur_max_func
__getmainargs
__initenv
__iob_func
__lconv_init
__set_app_type
__setusermatherr
_acmdln
_amsg_exit
_cexit
_commode
_errno
_fmode
_initterm
_lock
_onexit
_stricmp
_unlock
_wcsnicmp
abort
atoi
bsearch
calloc
exit
fflush
fprintf
fputc
free
fwrite
getenv
isspace
localeconv
malloc
mbstowcs
memcpy
memset
qsort
realloc
signal
strcmp
strerror
strlen
strncmp
strtol
vfprintf
wcslen
wcstombs
_strdup
user32
CharLowerBuffW
EnumWindows
GetThreadDesktop
GetUserObjectInformationA
IsIconic
MessageBoxW
RegisterWindowMessageA
SendMessageA
SendMessageTimeoutA
SetForegroundWindow
ShowWindow
Sections
.text Size: 62KB - Virtual size: 62KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 320B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 3KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 104B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 40KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE