Static task
static1
Behavioral task
behavioral1
Sample
a2b8d4f469a7b8c8900df12569de67f5c8cb68e68177d482ff7ccfe9d580101b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a2b8d4f469a7b8c8900df12569de67f5c8cb68e68177d482ff7ccfe9d580101b.exe
Resource
win10v2004-20240802-en
General
-
Target
a2b8d4f469a7b8c8900df12569de67f5c8cb68e68177d482ff7ccfe9d580101b.exe
-
Size
270KB
-
MD5
55cf0ba0a65d11eee638b11ba9e2f3a1
-
SHA1
a34d2eca33a11ee443675788174220984963be47
-
SHA256
a2b8d4f469a7b8c8900df12569de67f5c8cb68e68177d482ff7ccfe9d580101b
-
SHA512
474f6edd85755b256e23f1168f460516385f1adda62604e37bd95339c526ee81077854c6aaf171db0420173fd3eeb371070173f8036a106f3b28c5bf96fcfd67
-
SSDEEP
6144:tDN0YXMIebj1xc/2K1OIoZ8yruBSXMPoiHzWZVfPybyX86EsUY:t+/IebS2sOZZ8yruBSXMPohPyi8j
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a2b8d4f469a7b8c8900df12569de67f5c8cb68e68177d482ff7ccfe9d580101b.exe
Files
-
a2b8d4f469a7b8c8900df12569de67f5c8cb68e68177d482ff7ccfe9d580101b.exe.exe windows:5 windows x86 arch:x86
827297e739d4dc45bd5e6431a2540fd7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCommState
InterlockedDecrement
GetCurrentProcess
SetEnvironmentVariableW
InterlockedCompareExchange
SetVolumeMountPointW
GetModuleHandleW
CreateNamedPipeW
FindNextVolumeMountPointA
GetNumberFormatA
CreateActCtxW
TlsSetValue
LoadLibraryW
GetLocaleInfoW
GetCalendarInfoA
GetFileAttributesW
GetModuleFileNameW
GetShortPathNameA
CreateJobObjectA
VerifyVersionInfoW
InterlockedExchange
GlobalUnfix
GetLogicalDriveStringsA
GetLastError
SetLastError
GetProcAddress
PeekConsoleInputW
EnumSystemCodePagesW
GetConsoleDisplayMode
SetComputerNameA
LoadModule
SetThreadPriorityBoost
GetConsoleAliasExesLengthA
GetFileType
CreateFileMappingW
CreateHardLinkW
CreateEventW
FoldStringW
GetProcessShutdownParameters
LoadLibraryExA
VirtualProtect
GetCurrentDirectoryA
EnumDateFormatsW
GetFileTime
OpenEventW
SetCalendarInfoA
SetFileShortNameA
GetVersionExA
GetDiskFreeSpaceExW
GetWindowsDirectoryW
DebugBreak
GetTempPathA
EnumCalendarInfoExA
LocalFree
LCMapStringW
CommConfigDialogW
IsProcessorFeaturePresent
GetStringTypeW
MultiByteToWideChar
WideCharToMultiByte
IsValidCodePage
SetEndOfFile
GetConsoleAliasExesA
EnumCalendarInfoA
GlobalMemoryStatus
LocalAlloc
SetDefaultCommConfigA
GetOEMCP
GetACP
HeapFree
HeapAlloc
EncodePointer
DecodePointer
HeapReAlloc
GetCommandLineW
HeapSetInformation
GetStartupInfoW
HeapCreate
ExitProcess
WriteFile
GetStdHandle
Sleep
HeapSize
SetUnhandledExceptionFilter
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
TlsAlloc
TlsGetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
UnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
LeaveCriticalSection
EnterCriticalSection
RtlUnwind
GetCPInfo
user32
CharUpperA
SetCaretPos
LoadMenuA
GetMenuStringW
GetWindowLongW
InsertMenuItemW
GetMenu
DrawStateW
gdi32
GetCharWidthFloatA
CreateDCA
GetCharWidth32A
GetTextMetricsA
GetBkMode
ole32
CoUnmarshalHresult
Sections
.text Size: 204KB - Virtual size: 204KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 21KB - Virtual size: 32.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.yupehek Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bigo Size: 512B - Virtual size: 214B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.lud Size: 1024B - Virtual size: 923B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.welo Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ