Static task
static1
Behavioral task
behavioral1
Sample
167a47ed990dae57591c70500171158822a979a8b8aab39347d85508b3a15232N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
167a47ed990dae57591c70500171158822a979a8b8aab39347d85508b3a15232N.exe
Resource
win10v2004-20240802-en
General
-
Target
167a47ed990dae57591c70500171158822a979a8b8aab39347d85508b3a15232N
-
Size
136KB
-
MD5
004665aabf5d334654cabef1da6b7950
-
SHA1
7de450e2bef5814de703429aaa0baa14bcfc745a
-
SHA256
167a47ed990dae57591c70500171158822a979a8b8aab39347d85508b3a15232
-
SHA512
eda79c66a217a428be189b6dd61aebabde68b89e0a54c1b137dd0a5c0adf6bddf9c63c566957bb1d5fd663751c0772ed8d63b83266eaa05f88ece7004fd24089
-
SSDEEP
96:CjOc2z25xI1EzdenJsLdc42gwEYmo50jaud6R:Cj2i5xI1EzgnJ4d/2bEYt56axR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 167a47ed990dae57591c70500171158822a979a8b8aab39347d85508b3a15232N
Files
-
167a47ed990dae57591c70500171158822a979a8b8aab39347d85508b3a15232N.exe windows:5 windows x86 arch:x86
2587377ebeead58648d82fb5b0485c77
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCommandLineW
GetProcAddress
LoadLibraryExW
ExitProcess
CreateEventA
WaitForSingleObject
WinExec
VirtualAllocEx
SleepEx
LoadLibraryA
GetModuleFileNameA
GetModuleHandleA
CreateFileA
CloseHandle
CreateEventA
CreateProcessA
SetEvent
CreateMutexA
ReleaseMutex
EndUpdateResourceA
TermsrvAppInstallMode
Process32Next
MapViewOfFileEx
RemoveDirectoryW
WriteProfileStringA
BuildCommDCBAndTimeoutsW
SetFileAttributesA
GetWindowsDirectoryA
QueryDosDeviceA
IsDebuggerPresent
RemoveLocalAlternateComputerNameW
SetErrorMode
CreateWaitableTimerA
SetLocaleInfoA
GetCommModemStatus
TzSpecificLocalTimeToSystemTime
SetEnvironmentVariableW
SetDllDirectoryA
DeleteTimerQueue
GetConsoleInputExeNameA
HeapValidate
_lcreat
WriteConsoleOutputA
LocalSize
WriteFileGather
MoveFileWithProgressA
BaseCleanupAppcompatCacheSupport
GetProcessTimes
GetExitCodeProcess
GlobalAddAtomA
GetFileSize
CreateRemoteThread
WriteConsoleOutputAttribute
FindActCtxSectionStringW
GetThreadContext
GetLogicalDriveStringsW
GetProcessIoCounters
LoadLibraryExA
ReadConsoleInputExW
GetProfileStringA
CreateTapePartition
lstrcpynW
CheckNameLegalDOS8Dot3W
QueryDosDeviceW
GetCurrencyFormatA
BindIoCompletionCallback
SetLocaleInfoW
RegisterConsoleIME
GetGeoInfoA
CancelDeviceWakeupRequest
GetTapeParameters
SetProcessWorkingSetSize
CreateFileMappingW
HeapLock
GetProfileStringW
SystemTimeToTzSpecificLocalTime
RegisterConsoleOS2
CheckNameLegalDOS8Dot3A
GetModuleHandleExA
IsDBCSLeadByte
AddAtomA
SetCurrentDirectoryW
SetConsolePalette
IsBadStringPtrA
VirtualProtectEx
SetConsoleCtrlHandler
GetTickCount
Thread32First
WriteFile
SetCurrentDirectoryA
SetConsoleOutputCP
OpenFile
SetConsoleKeyShortcuts
VirtualAlloc
OpenMutexW
GetProfileSectionA
SetDefaultCommConfigW
GetFullPathNameW
GetGeoInfoW
GetProfileIntA
WriteConsoleOutputCharacterA
GetLargestConsoleWindowSize
GetProcessShutdownParameters
CreateWaitableTimerW
GetNamedPipeHandleStateA
BasepCheckWinSaferRestrictions
RegisterWaitForSingleObjectEx
DuplicateHandle
WritePrivateProfileSectionW
GetDiskFreeSpaceA
ConvertDefaultLocale
FindVolumeMountPointClose
GetNumaHighestNodeNumber
LZCreateFileW
GetVDMCurrentDirectories
BaseFlushAppcompatCache
SetHandleCount
SetCalendarInfoW
DuplicateConsoleHandle
FindFirstChangeNotificationA
LocalFileTimeToFileTime
BaseInitAppcompatCacheSupport
ExpungeConsoleCommandHistoryW
GetStdHandle
GlobalFindAtomA
GetAtomNameW
DeleteFiber
GetExpandedNameW
GetThreadTimes
SuspendThread
GetStringTypeExW
ExpungeConsoleCommandHistoryA
PrepareTape
SetConsoleCursor
CancelIo
DeviceIoControl
TlsSetValue
IsBadReadPtr
EnumLanguageGroupLocalesA
SetNamedPipeHandleState
Sections
.text Size: 132KB - Virtual size: 131KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE