Static task
static1
Behavioral task
behavioral1
Sample
61b72b2d4099b7ca2af5318b4ea6a668.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
61b72b2d4099b7ca2af5318b4ea6a668.exe
Resource
win10v2004-20241007-en
General
-
Target
61b72b2d4099b7ca2af5318b4ea6a668.exe
-
Size
704KB
-
MD5
61b72b2d4099b7ca2af5318b4ea6a668
-
SHA1
7c38e00060124176ae1b5ad7f17dd8a202445f26
-
SHA256
b3b766fc82f285fbdfdfd1246fa7a227e7e8d4228a0a13c6187c4aab2149d0be
-
SHA512
b764e2204f473c7d09186a1dd8f4111344066a5219c76fe08076c46053d2ff620c43257f09e249931b684f1c055be2db3cffac1d4543c062ca7f956aca7f8106
-
SSDEEP
12288:q3IbtEqk/k9aqG1G7uSuYC7QQhguHuM+hECDgLEoX5+rUKHRmc65L2Vl2:q3C+BMQqGESMAh/OMknD4jcrJHRmbOl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 61b72b2d4099b7ca2af5318b4ea6a668.exe
Files
-
61b72b2d4099b7ca2af5318b4ea6a668.exe.exe windows:5 windows x86 arch:x86
fe68515784559bdc15451f33c744290f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTempFileNameW
WriteConsoleInputW
GetConsoleAliasExesA
CallNamedPipeA
CreateProcessW
InterlockedIncrement
OpenJobObjectA
InterlockedDecrement
GetCurrentProcess
GetComputerNameW
GetTimeFormatA
FreeEnvironmentStringsA
GetCommConfig
GetDllDirectoryW
GetNumberFormatA
ClearCommBreak
EnumTimeFormatsW
TlsSetValue
GetCurrencyFormatW
SetFileShortNameW
LoadLibraryW
GetFileAttributesW
GetModuleFileNameW
GetShortPathNameA
LCMapStringA
InterlockedExchange
GlobalUnfix
GetLogicalDriveStringsA
GetLastError
SetLastError
GetProcAddress
VirtualAlloc
DefineDosDeviceW
LoadLibraryA
SetEnvironmentVariableA
GlobalUnWire
GetCurrentDirectoryA
OpenEventW
GetVersionExA
ReadConsoleInputW
SetFileAttributesW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
GetModuleHandleW
Sleep
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
HeapAlloc
SetFilePointer
EnterCriticalSection
LeaveCriticalSection
TerminateProcess
IsDebuggerPresent
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
DeleteCriticalSection
TlsGetValue
TlsAlloc
TlsFree
GetCurrentThreadId
HeapCreate
VirtualFree
HeapFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeCriticalSectionAndSpinCount
HeapReAlloc
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetModuleHandleA
SetStdHandle
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
FlushFileBuffers
RtlUnwind
HeapSize
GetLocaleInfoA
RaiseException
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
CloseHandle
Sections
.text Size: 590KB - Virtual size: 589KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.noramix Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rusovox Size: 512B - Virtual size: 214B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 81KB - Virtual size: 2.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ