Static task
static1
Behavioral task
behavioral1
Sample
035daed712df0e73601fb6b63ebbe4837b1989c4a51c0ceb5a95134620f6f732.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
035daed712df0e73601fb6b63ebbe4837b1989c4a51c0ceb5a95134620f6f732.exe
Resource
win10v2004-20240802-en
General
-
Target
035daed712df0e73601fb6b63ebbe4837b1989c4a51c0ceb5a95134620f6f732.exe
-
Size
7.2MB
-
MD5
8276be102845dc450ee81142181bb0ac
-
SHA1
86892cdf316dcabd59763693c510039435df16d1
-
SHA256
035daed712df0e73601fb6b63ebbe4837b1989c4a51c0ceb5a95134620f6f732
-
SHA512
4ae7f1844c987d97a989585ff5cd78fc72263f3901ba609e6ddd71d5a8ce7757e1aed1fd7e1b21e494539ac4171f9fe2172360d2bc22969134f14ab58a5cb3b2
-
SSDEEP
196608:3EU8hXQkvWksO50yO8u98vAHWnwRoCZUxlwQB:U1hXrzP0yO8u9CAHDRoCZ0ll
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 035daed712df0e73601fb6b63ebbe4837b1989c4a51c0ceb5a95134620f6f732.exe
Files
-
035daed712df0e73601fb6b63ebbe4837b1989c4a51c0ceb5a95134620f6f732.exe.exe windows:6 windows x64 arch:x64
112fa09e6fcdee4634e7578b0a8d6fd4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
shell32
SHFileOperationW
SHGetFolderPathW
kernel32
TlsAlloc
WriteConsoleW
CreateDirectoryW
SetConsoleCtrlHandler
GetCommandLineW
WriteFile
TerminateProcess
GetModuleFileNameW
GetTempPathW
FindResourceA
WaitForSingleObject
CreateFileW
GetFileAttributesW
Sleep
GetLastError
LockResource
CloseHandle
LoadResource
SetEnvironmentVariableA
GetCurrentProcessId
CreateProcessW
GetSystemTimeAsFileTime
FormatMessageA
GetExitCodeProcess
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentThreadId
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
HeapReAlloc
RtlUnwindEx
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
EncodePointer
RaiseException
RtlPcToFileHeader
ExitProcess
GetModuleHandleExW
GetCommandLineA
GetStdHandle
HeapAlloc
MultiByteToWideChar
HeapFree
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
LCMapStringW
GetFileType
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
WideCharToMultiByte
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetStdHandle
GetStringTypeW
GetProcessHeap
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
GetFileSizeEx
SetFilePointerEx
HeapSize
Sections
EBY5MMT2 Size: 122KB - Virtual size: 122KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
28B3E94H Size: 48KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
8F376P9X Size: 3KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
CSL9ANT3 Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
2U036ITX Size: 13.1MB - Virtual size: 13.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
BYRQXKG6 Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ