Static task
static1
Behavioral task
behavioral1
Sample
3eac19601c2f51ab48c6f86dc4c06f9d1f37500f6a0d6bace668784dc3788c9b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3eac19601c2f51ab48c6f86dc4c06f9d1f37500f6a0d6bace668784dc3788c9b.exe
Resource
win10v2004-20241007-en
General
-
Target
3eac19601c2f51ab48c6f86dc4c06f9d1f37500f6a0d6bace668784dc3788c9b
-
Size
421KB
-
MD5
16f27afc19b27c96a37db20e018f7878
-
SHA1
74e9ae404b8cd2b0aac9712817b65bc64b28bd78
-
SHA256
3eac19601c2f51ab48c6f86dc4c06f9d1f37500f6a0d6bace668784dc3788c9b
-
SHA512
21dafae871f54d41ac69c91fbccfc6cc5d69d180b28c6749d3d5e72eb6f4c7afa654c5890737c716f59ce0c3c22db5c72aea9bb96dd85d4e315d29bf72761f0e
-
SSDEEP
6144:q9Lm2kkdBG3ylPhFcQGzTN65OrV8jTrD/7sFj4:Oy2kk/plPhWQGzgOr6/rl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 3eac19601c2f51ab48c6f86dc4c06f9d1f37500f6a0d6bace668784dc3788c9b
Files
-
3eac19601c2f51ab48c6f86dc4c06f9d1f37500f6a0d6bace668784dc3788c9b.exe windows:5 windows x86 arch:x86
1d1777ac2454d7aeb3037f82cfc93179
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetConsoleAliasExesA
CommConfigDialogA
CreateProcessW
ClearCommError
OpenJobObjectA
InterlockedDecrement
GetCurrentProcess
SetEnvironmentVariableW
CreateJobObjectW
SetComputerNameW
GetTickCount
GetNumberFormatA
GetCurrencyFormatA
EnumTimeFormatsA
GetEnvironmentStrings
SetFileShortNameW
LoadLibraryW
GetLocaleInfoW
ReadConsoleInputA
SetVolumeMountPointA
GetVersionExW
GetFileAttributesA
GetTimeFormatW
CreateSemaphoreA
GetModuleFileNameW
CreateActCtxA
GetShortPathNameA
TlsGetValue
InterlockedExchange
GetLogicalDriveStringsA
GetLastError
GetCurrentDirectoryW
SetLastError
GetProcAddress
VirtualAlloc
CreateNamedPipeA
DefineDosDeviceA
GlobalFree
GetTempFileNameA
LoadLibraryA
InterlockedExchangeAdd
GetNumberFormatW
OpenEventA
GetCommMask
GetModuleFileNameA
EnumDateFormatsA
GlobalUnWire
GetShortPathNameW
GetDiskFreeSpaceExA
SetFileAttributesW
LCMapStringW
GetComputerNameA
VerifyVersionInfoW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
GetModuleHandleW
Sleep
ExitProcess
WriteFile
GetStdHandle
HeapAlloc
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
DeleteCriticalSection
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
HeapCreate
VirtualFree
HeapFree
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
LeaveCriticalSection
EnterCriticalSection
TerminateProcess
IsDebuggerPresent
InitializeCriticalSectionAndSpinCount
HeapReAlloc
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
RtlUnwind
HeapSize
GetLocaleInfoA
WideCharToMultiByte
GetModuleHandleA
RaiseException
LCMapStringA
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
user32
GetAltTabInfoW
gdi32
GetCharWidthA
winhttp
WinHttpOpen
Sections
.text Size: 274KB - Virtual size: 274KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 23KB - Virtual size: 65KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.fekuja Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.dodicuc Size: 512B - Virtual size: 214B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.sozosun Size: 1024B - Virtual size: 923B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 115KB - Virtual size: 115KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ