Static task
static1
Behavioral task
behavioral1
Sample
79687ef32097ae98d2d577f0d362ffed81fd058212a210a8ffa371d7fc1be4f0.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
79687ef32097ae98d2d577f0d362ffed81fd058212a210a8ffa371d7fc1be4f0.exe
Resource
win10v2004-20241007-en
General
-
Target
79687ef32097ae98d2d577f0d362ffed81fd058212a210a8ffa371d7fc1be4f0.exe
-
Size
443KB
-
MD5
14f08bd33d03c8c7fcc198cb30dc29f6
-
SHA1
5f3bc9b11d0d629a8b5be0f0f4ae0ae640d49463
-
SHA256
79687ef32097ae98d2d577f0d362ffed81fd058212a210a8ffa371d7fc1be4f0
-
SHA512
82f6f076ab818f8cc6ca22620977f837bb3c64699f5d2f6acbe1da37fee9ebc9eea44bb76ea9205284df5cb27123acb69168b6bf286b50c55168c285709db847
-
SSDEEP
6144:Cvk5/0UUS0436oerlk7DWpnocMbqj6m8Vo/DaZEjy6BbO42T8:550UA43FN7+ocMbUT8anNO4O
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 79687ef32097ae98d2d577f0d362ffed81fd058212a210a8ffa371d7fc1be4f0.exe
Files
-
79687ef32097ae98d2d577f0d362ffed81fd058212a210a8ffa371d7fc1be4f0.exe.exe windows:5 windows x86 arch:x86
cf2df69e8bb6acbf3b231da2c6f4bda2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InterlockedDecrement
SetEnvironmentVariableW
QueryDosDeviceA
SetVolumeMountPointW
GetComputerNameW
GetTimeFormatA
GetTickCount
CreateNamedPipeW
LocalFlags
GetNumberFormatA
SetFileTime
ClearCommBreak
TlsSetValue
GetEnvironmentStrings
SetFileShortNameW
LoadLibraryW
CopyFileW
_hread
GetCalendarInfoA
SetVolumeMountPointA
GetVersionExW
GetFileAttributesA
CreateProcessA
GetModuleFileNameW
CreateActCtxA
GetEnvironmentVariableA
GetShortPathNameA
CreateJobObjectA
EnumCalendarInfoW
InterlockedExchange
GetStdHandle
GetLogicalDriveStringsA
GetLastError
GetCurrentDirectoryW
GetProcAddress
EnumSystemCodePagesW
SetComputerNameA
SetFileAttributesA
GlobalFree
LoadLibraryA
LocalAlloc
CreateHardLinkW
GetNumberFormatW
CreateEventW
OpenEventA
FoldStringW
GlobalWire
EnumDateFormatsW
GetShortPathNameW
GetDiskFreeSpaceExA
ReadConsoleInputW
GetCurrentProcessId
DebugBreak
GetTempPathA
LCMapStringW
EnumCalendarInfoA
InterlockedIncrement
CommConfigDialogA
GetConsoleAliasExesA
GetLocaleInfoA
SetFilePointer
VerifyVersionInfoW
WriteConsoleW
CloseHandle
FlushFileBuffers
GetConsoleMode
GetConsoleCP
EncodePointer
DecodePointer
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapFree
HeapReAlloc
GetModuleHandleW
ExitProcess
GetCommandLineW
HeapSetInformation
GetStartupInfoW
RaiseException
RtlUnwind
HeapAlloc
WideCharToMultiByte
MultiByteToWideChar
GetCPInfo
IsProcessorFeaturePresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
HeapCreate
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
TlsAlloc
TlsGetValue
TlsFree
SetLastError
GetCurrentThreadId
WriteFile
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetSystemTimeAsFileTime
HeapSize
GetACP
GetOEMCP
IsValidCodePage
GetStringTypeW
SetStdHandle
CreateFileW
gdi32
GetCharWidthI
CreateDCA
CreateDCW
GetCharWidth32A
advapi32
ReadEventLogW
ole32
CoSuspendClassObjects
winhttp
WinHttpOpen
WinHttpCheckPlatform
Sections
.text Size: 53KB - Virtual size: 53KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 237KB - Virtual size: 237KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 71KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.wagasul Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.boyeyaw Size: 512B - Virtual size: 214B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.damupos Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 124KB - Virtual size: 2.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ