Static task
static1
Behavioral task
behavioral1
Sample
597qj98m99cg7hv5sgvemfa.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
597qj98m99cg7hv5sgvemfa.exe
Resource
win10v2004-20240802-en
General
-
Target
597qj98m99cg7hv5sgvemfa.exe
-
Size
96KB
-
MD5
319865d78cc8df6270e27521b8182bff
-
SHA1
716e70b00aa2d154367028de896c7d76c9d24350
-
SHA256
a78945e7532ecdb29b9448a1f3eef2f45ec2f01ca070b9868258cbcd31eac23f
-
SHA512
78cd48c8ba558dffc204a70dbff13889984f80f268a715fec7fc018a7718a11822975f775d44a927c5815aa2ccc0d78502264354bf5d8c0502b5a0a323948611
-
SSDEEP
1536:EJm0mRQUtrg7DYy+F2aQuuvL7V0Y91n1ot:EJmjSUtMiF2suvVr11ot
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 597qj98m99cg7hv5sgvemfa.exe
Files
-
597qj98m99cg7hv5sgvemfa.exe.exe windows:4 windows x64 arch:x64
19fedddeb417604e5144a45d71851d10
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
BuildSecurityDescriptorW
BuildTrusteeWithSidW
CreateProcessAsUserA
GetLengthSid
GetTokenInformation
LogonUserA
OpenProcessToken
fwpuclnt
FwpmEngineClose0
FwpmEngineOpen0
FwpmFilterAdd0
FwpmFilterDeleteByKey0
FwpmFreeMemory0
FwpmProviderAdd0
FwpmProviderCreateEnumHandle0
FwpmProviderDestroyEnumHandle0
FwpmProviderEnum0
kernel32
CloseHandle
CopyFileA
CreateDirectoryA
CreateFileA
CreateProcessA
CreateToolhelp32Snapshot
DeleteCriticalSection
DeleteFileA
EnterCriticalSection
ExpandEnvironmentStringsA
FindClose
FindFirstFileA
FindNextFileA
FindResourceA
FreeLibrary
GetExitCodeProcess
GetFileAttributesA
GetFileAttributesW
GetFileSize
GetFileTime
GetLastError
GetModuleFileNameA
GetModuleHandleExA
GetModuleHandleW
GetProcAddress
GetProcessHeap
GetSystemTimeAsFileTime
HeapAlloc
HeapFree
InitializeCriticalSection
InitializeCriticalSectionAndSpinCount
IsDBCSLeadByteEx
LeaveCriticalSection
LoadLibraryA
LoadLibraryW
LoadResource
LocalAlloc
LocalFree
LockFileEx
MultiByteToWideChar
OpenProcess
Process32First
Process32Next
QueryDosDeviceW
QueryFullProcessImageNameW
RemoveDirectoryA
SetFileAttributesA
SetUnhandledExceptionFilter
Sleep
TerminateProcess
TlsGetValue
UnlockFileEx
VirtualProtect
VirtualQuery
WaitForSingleObject
WideCharToMultiByte
msvcrt
__C_specific_handler
___lc_codepage_func
___mb_cur_max_func
__getmainargs
__initenv
__iob_func
__set_app_type
__setusermatherr
_amsg_exit
_cexit
_commode
_errno
fwprintf
_fmode
_initterm
_onexit
_strtoui64
abort
calloc
exit
fclose
fflush
fopen
fprintf
fputc
fputs
fputwc
fread
free
fseek
ftell
fwrite
localeconv
malloc
memcpy
memset
signal
strcat
strcmp
strcpy
strerror
strlen
strncmp
strncpy
strstr
strtol
strtoul
towlower
vfprintf
wcschr
wcscmp
wcslen
wcsncpy
ws2_32
inet_addr
ntohl
Sections
.text Size: 62KB - Virtual size: 61KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 3KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 96B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 136B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ