Static task
static1
Behavioral task
behavioral1
Sample
27c64ea16f95e24639a334f20c77214022da845686b32ca1dfe2be7e62250edc.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
27c64ea16f95e24639a334f20c77214022da845686b32ca1dfe2be7e62250edc.exe
Resource
win10v2004-20241007-en
General
-
Target
27c64ea16f95e24639a334f20c77214022da845686b32ca1dfe2be7e62250edc
-
Size
694KB
-
MD5
0c48766706b9c7458a013d0c7336e932
-
SHA1
7c9e6e880b4b5645acaeb2733e2035ff1a57a04c
-
SHA256
27c64ea16f95e24639a334f20c77214022da845686b32ca1dfe2be7e62250edc
-
SHA512
adcd527be27a4d1a8541805a7b9c07a36e46677e3024d38871ecff70f20e6f131f960ec977b54e1a38ed197bd7e28b86311dcd5354e3a0c67ecf47b6fa9137b8
-
SSDEEP
12288:zt0qsEAq3kh0snRy24PG5fgCo//RccvbiOpIWaEx7rOJZo+d+pOpB:GTPq0hpnUleChFDdp9aS7rOJ2G+EH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 27c64ea16f95e24639a334f20c77214022da845686b32ca1dfe2be7e62250edc
Files
-
27c64ea16f95e24639a334f20c77214022da845686b32ca1dfe2be7e62250edc.exe windows:5 windows x86 arch:x86
e8841d1185fc994bda7dc3cfde7e0860
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetDefaultCommConfigA
CreateMutexW
lstrcmpA
EnumCalendarInfoA
WriteConsoleInputW
EnumDateFormatsExW
CopyFileExW
VerSetConditionMask
GetConsoleAliasA
GetEnvironmentStringsW
GetModuleHandleExW
WaitForSingleObject
SetEvent
_lclose
GetProcessPriorityBoost
GetModuleHandleW
EnumCalendarInfoExW
GlobalAlloc
GetFirmwareEnvironmentVariableA
LoadLibraryW
SetMessageWaitingIndicator
GetStdHandle
IsDBCSLeadByteEx
SetLastError
GetProcAddress
GetComputerNameExW
SearchPathA
OpenWaitableTimerA
OpenMutexA
LocalAlloc
SetCalendarInfoW
BuildCommDCBAndTimeoutsW
SetConsoleOutputCP
WriteProfileSectionW
AddAtomA
EnumResourceTypesW
GetPrivateProfileSectionNamesA
FindFirstVolumeMountPointA
ContinueDebugEvent
FindNextFileW
GetStringTypeW
FatalAppExitA
GetCurrentThreadId
GetWindowsDirectoryW
DeleteFileA
EnumSystemLocalesA
GetLocaleInfoA
GetLastError
MoveFileA
HeapReAlloc
GetCommandLineA
HeapSetInformation
GetStartupInfoW
EncodePointer
DecodePointer
IsProcessorFeaturePresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
EnterCriticalSection
LeaveCriticalSection
HeapCreate
HeapDestroy
HeapFree
HeapAlloc
ExitProcess
WriteFile
GetModuleFileNameW
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
InterlockedDecrement
GetCurrentThread
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
RaiseException
Sleep
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
RtlUnwind
SetConsoleCtrlHandler
FreeLibrary
InterlockedExchange
GetLocaleInfoW
GetConsoleCP
GetConsoleMode
FlushFileBuffers
LCMapStringW
MultiByteToWideChar
SetFilePointer
HeapSize
CloseHandle
WriteConsoleW
SetStdHandle
CreateFileW
GetUserDefaultLCID
IsValidLocale
user32
LoadMenuA
Sections
.text Size: 112KB - Virtual size: 111KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 499KB - Virtual size: 39.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 82KB - Virtual size: 81KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ