Static task
static1
Behavioral task
behavioral1
Sample
b223a95aff703bbdb89aea93266516b65110b3b6f2e944905f82b30cbbd099ddN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b223a95aff703bbdb89aea93266516b65110b3b6f2e944905f82b30cbbd099ddN.exe
Resource
win10v2004-20240802-en
General
-
Target
b223a95aff703bbdb89aea93266516b65110b3b6f2e944905f82b30cbbd099ddN
-
Size
315KB
-
MD5
9413715b699062fb88e6807082569ad0
-
SHA1
cd590c604fd46d17a9c5b2b908a10f4a3ed1cc64
-
SHA256
b223a95aff703bbdb89aea93266516b65110b3b6f2e944905f82b30cbbd099dd
-
SHA512
2a5942a93c88aefab662520d81a97c07fffe2b5f8b2f001532eb51ff8d8e53baec9bc0231f14e1f10c15f6df850ee7c815baf01efbd9f3040651a8b11cac76b1
-
SSDEEP
6144:B40W7UXPpy1t5WfTAr9mbwJXOctWN5oZXuC+liAxprQZX:q0W7UXPp4t5O+9mbw/uC+YAxFQZX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b223a95aff703bbdb89aea93266516b65110b3b6f2e944905f82b30cbbd099ddN
Files
-
b223a95aff703bbdb89aea93266516b65110b3b6f2e944905f82b30cbbd099ddN.exe windows:5 windows x86 arch:x86
9f3ee3f3c3726c75bbc6e66ab6cb1119
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
MapViewOfFile
UnmapViewOfFile
WaitForSingleObject
GetTickCount
WriteFile
Sleep
GetModuleFileNameW
CreateFileW
GetLastError
CreateFileMappingW
DeleteFileW
GetTempPathA
GetVersionExW
FreeLibrary
GetFileSize
GetProcAddress
VirtualAlloc
LoadLibraryA
VirtualProtect
HeapAlloc
HeapFree
GetProcessHeap
GetModuleHandleA
InterlockedIncrement
InterlockedDecrement
InterlockedCompareExchange
GetModuleHandleW
CloseHandle
VirtualFree
GetFullPathNameW
WriteConsoleW
FlushFileBuffers
SetStdHandle
LoadLibraryW
OutputDebugStringW
SetFilePointerEx
GetConsoleCP
LoadLibraryExW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCurrentProcessId
QueryPerformanceCounter
GetFileType
SetFilePointer
ReadConsoleW
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
WideCharToMultiByte
MultiByteToWideChar
GetStringTypeW
HeapReAlloc
GetSystemTimeAsFileTime
RtlUnwind
GetCommandLineW
RaiseException
InitializeCriticalSectionAndSpinCount
GetCPInfo
IsProcessorFeaturePresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
ExitProcess
GetModuleHandleExW
HeapSize
IsDebuggerPresent
GetCurrentThreadId
GetStdHandle
IsValidCodePage
GetACP
GetOEMCP
ReadFile
GetConsoleMode
VirtualQuery
gdi32
CreateBitmap
SelectObject
CreateCompatibleDC
GetObjectW
DeleteDC
user32
DestroyWindow
UpdateLayeredWindow
SetTimer
GetWindowRect
MonitorFromPoint
LoadCursorW
GetDC
TranslateMessage
PeekMessageW
ReleaseDC
GetDesktopWindow
ShowWindow
CreateWindowExW
RegisterClassW
UpdateWindow
GetMonitorInfoW
DefWindowProcW
DispatchMessageW
Sections
.text Size: 188KB - Virtual size: 188KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 46KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 14KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 26KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 35KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ