Static task
static1
Behavioral task
behavioral1
Sample
c01f8248d713b8ac56f4087615ad16ce7e0fc6c3504c1e9945c35c0775999661.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c01f8248d713b8ac56f4087615ad16ce7e0fc6c3504c1e9945c35c0775999661.exe
Resource
win10v2004-20241007-en
General
-
Target
c01f8248d713b8ac56f4087615ad16ce7e0fc6c3504c1e9945c35c0775999661
-
Size
378KB
-
MD5
d17de7406ca819e09400039d8f090ce0
-
SHA1
82545fffc36151e2ebf52c07694ff3702936c94b
-
SHA256
c01f8248d713b8ac56f4087615ad16ce7e0fc6c3504c1e9945c35c0775999661
-
SHA512
6de4c3804e91f8cc6a780c72bb97d61c71cfd6211246e5dd5cbbf276b378f782be7f493ea954d3c0de3b9ce05f0aae6a1ea138e5918a6a203e41fd5d72d4d7f7
-
SSDEEP
6144:EoOlzZvhhIUUH2g34i+iRW0o1Qcg8/44PVIqzplAqh:6zNz2XIAT8giVIIpl7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c01f8248d713b8ac56f4087615ad16ce7e0fc6c3504c1e9945c35c0775999661
Files
-
c01f8248d713b8ac56f4087615ad16ce7e0fc6c3504c1e9945c35c0775999661.exe windows:5 windows x86 arch:x86
68216f398c0715d5d8bca1b7eb918f6e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
OpenJobObjectA
ReadConsoleA
InterlockedDecrement
GlobalSize
SetDefaultCommConfigW
QueryDosDeviceA
InterlockedCompareExchange
GetComputerNameW
SetEvent
GetNumaAvailableMemoryNode
FreeEnvironmentStringsA
GetModuleHandleW
GetConsoleAliasesLengthA
FormatMessageA
SetCommState
GetLocaleInfoW
GetConsoleWindow
ReadConsoleOutputW
GetVersionExW
GetStringTypeExW
HeapDestroy
GetFileAttributesA
DeleteVolumeMountPointA
GetFileAttributesW
GetBinaryTypeA
GetConsoleFontSize
DisconnectNamedPipe
LCMapStringA
GetLastError
GetProcAddress
MoveFileW
SetStdHandle
GetNumaHighestNodeNumber
LoadLibraryA
LocalAlloc
WritePrivateProfileStringA
GetModuleFileNameA
BuildCommDCBA
FatalAppExitA
GetShortPathNameW
SetCalendarInfoA
FindAtomW
SearchPathW
GetConsoleAliasExesLengthA
GetTimeFormatW
PulseEvent
HeapAlloc
MultiByteToWideChar
Sleep
ExitProcess
GetCommandLineA
GetStartupInfoA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
HeapFree
VirtualFree
VirtualAlloc
HeapReAlloc
HeapCreate
WriteFile
GetStdHandle
GetCPInfo
InterlockedIncrement
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
InitializeCriticalSectionAndSpinCount
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
RtlUnwind
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
HeapSize
gdi32
GetBoundsRect
advapi32
ClearEventLogW
Sections
.text Size: 195KB - Virtual size: 195KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 39.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vazanuc Size: 14KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tebi Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 144KB - Virtual size: 143KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ