Static task
static1
Behavioral task
behavioral1
Sample
67cca8e76698d506703867218d35889e503f8ab35200e0cec204df1df3ed1ee3.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
67cca8e76698d506703867218d35889e503f8ab35200e0cec204df1df3ed1ee3.exe
Resource
win10v2004-20241007-en
General
-
Target
67cca8e76698d506703867218d35889e503f8ab35200e0cec204df1df3ed1ee3.exe
-
Size
237KB
-
MD5
51edb0928c2e36654e59e2451e2540b6
-
SHA1
fc0517fec5bbdaefac962b819bff2ea3d6f92de9
-
SHA256
67cca8e76698d506703867218d35889e503f8ab35200e0cec204df1df3ed1ee3
-
SHA512
a9412a504e50dfbb0ca21a48181ced2dbb6fa123411ef0d5b17b235ba97589a3fb05e073b102e887ffdf62aecf3c3f6eae1893c8c21a1e5ed9d717b3ad313251
-
SSDEEP
3072:H0BoYKwRl18reAhtaAJ54Q+CoNTuA9FBxqXYUGrG:H0BoYVRIjhT+FwsqI
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 67cca8e76698d506703867218d35889e503f8ab35200e0cec204df1df3ed1ee3.exe
Files
-
67cca8e76698d506703867218d35889e503f8ab35200e0cec204df1df3ed1ee3.exe.exe windows:5 windows x86 arch:x86
67def8961050d10da5ff74312b7f0aec
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
OpenJobObjectA
ReadConsoleA
InterlockedDecrement
GlobalSize
SetDefaultCommConfigW
QueryDosDeviceA
InterlockedCompareExchange
GetComputerNameW
SetEvent
GetNumaAvailableMemoryNode
FreeEnvironmentStringsA
GetModuleHandleW
GetConsoleAliasesLengthA
SetCommState
GetConsoleWindow
ReadConsoleOutputW
GetVersionExW
GetStringTypeExW
HeapDestroy
GetFileAttributesA
GetTimeFormatW
DeleteVolumeMountPointA
GetFileAttributesW
GetBinaryTypeA
DisconnectNamedPipe
LCMapStringA
GetLastError
GetProcAddress
MoveFileW
SetStdHandle
GetNumaHighestNodeNumber
LoadLibraryA
LocalAlloc
WritePrivateProfileStringA
GetModuleFileNameA
BuildCommDCBA
FatalAppExitA
GetShortPathNameW
SetCalendarInfoA
FindAtomW
SearchPathW
GetConsoleAliasExesLengthA
SetConsoleMode
PulseEvent
HeapAlloc
MultiByteToWideChar
Sleep
ExitProcess
GetCommandLineA
GetStartupInfoA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
HeapFree
VirtualFree
VirtualAlloc
HeapReAlloc
HeapCreate
WriteFile
GetStdHandle
GetCPInfo
InterlockedIncrement
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
InitializeCriticalSectionAndSpinCount
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
RtlUnwind
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
HeapSize
gdi32
GetBoundsRect
advapi32
ClearEventLogW
Sections
.text Size: 83KB - Virtual size: 83KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 39.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rupun Size: 14KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.levop Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 115KB - Virtual size: 114KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ