Static task
static1
Behavioral task
behavioral1
Sample
d7b73cd4c97aad0d39d096e2e46721a0a2bc39836d838378cc929b7a85e6d0f1.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d7b73cd4c97aad0d39d096e2e46721a0a2bc39836d838378cc929b7a85e6d0f1.exe
Resource
win10v2004-20241007-en
General
-
Target
d7b73cd4c97aad0d39d096e2e46721a0a2bc39836d838378cc929b7a85e6d0f1
-
Size
417KB
-
MD5
0cdaf0b6c7486adab8f4486b28357d84
-
SHA1
0a52c651793d114ffac7560b3f291a65c44e7dcf
-
SHA256
d7b73cd4c97aad0d39d096e2e46721a0a2bc39836d838378cc929b7a85e6d0f1
-
SHA512
47b1c2b26cd66df8e4cc67b2dcc9216adb68d082bbcde4382a17c7068de4cc9f35c3071de6a4553c36d347eca6c729f557c752120bd5b788ee97d35750248846
-
SSDEEP
6144:3WPqamuOVLD/UUAi+hzkU69ie0NhohZaLiRPIhKZ0kOMbor:3WPZO1/Pz+hzkMPNhohFAhs9K
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource d7b73cd4c97aad0d39d096e2e46721a0a2bc39836d838378cc929b7a85e6d0f1
Files
-
d7b73cd4c97aad0d39d096e2e46721a0a2bc39836d838378cc929b7a85e6d0f1.exe windows:5 windows x86 arch:x86
3b35b020e2039ef214f663d245b6e6cf
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetWaitableTimer
InterlockedDecrement
GetNumberOfConsoleMouseButtons
InitializeSListHead
CreateJobObjectW
CreateDirectoryW
UnlockFile
GetTimeFormatA
ConnectNamedPipe
TzSpecificLocalTimeToSystemTime
GetSystemPowerStatus
GetSystemTimeAdjustment
HeapDestroy
GetFileAttributesA
GetAtomNameW
IsDBCSLeadByte
ReadFile
GetModuleFileNameW
GetTimeZoneInformation
GetACP
RaiseException
GetHandleInformation
GetLastError
GetCurrentDirectoryW
GetProcAddress
FreeLibrary
EnumDateFormatsExA
LocalLock
EnterCriticalSection
PrepareTape
GetProcessVersion
LocalAlloc
SetCalendarInfoW
AddVectoredExceptionHandler
SetConsoleOutputCP
VirtualLock
HeapLock
SetCommMask
GetTapeParameters
GetModuleHandleA
QueryMemoryResourceNotification
FreeEnvironmentStringsW
FindAtomW
SetFileAttributesW
LCMapStringW
CompareStringW
CompareStringA
GetProcessHeap
FlushFileBuffers
IsValidLocale
EnumSystemLocalesA
GetConsoleAliasExesLengthA
SetEndOfFile
SetLocalTime
FindVolumeMountPointClose
GetConsoleAliasesLengthW
HeapReAlloc
HeapAlloc
GetModuleHandleW
Sleep
ExitProcess
GetCommandLineA
GetStartupInfoA
RtlUnwind
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapFree
LeaveCriticalSection
DeleteCriticalSection
FatalAppExitA
HeapCreate
VirtualFree
VirtualAlloc
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
GetCurrentThread
WriteFile
GetStdHandle
GetModuleFileNameA
SetConsoleCtrlHandler
InterlockedExchange
LoadLibraryA
InitializeCriticalSectionAndSpinCount
FreeEnvironmentStringsA
GetEnvironmentStrings
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
SetFilePointer
GetConsoleCP
GetConsoleMode
GetCPInfo
GetOEMCP
IsValidCodePage
MultiByteToWideChar
CloseHandle
CreateFileA
HeapSize
GetLocaleInfoW
GetLocaleInfoA
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
LCMapStringA
GetStringTypeA
GetStringTypeW
GetDateFormatA
GetUserDefaultLCID
SetEnvironmentVariableA
user32
GetMonitorInfoA
GetDesktopWindow
GetProcessDefaultLayout
GetClassLongA
GetUserObjectInformationA
advapi32
ImpersonateAnonymousToken
EqualSid
RegCreateKeyW
SetPrivateObjectSecurity
Sections
.text Size: 345KB - Virtual size: 344KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 41KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ