Static task
static1
Behavioral task
behavioral1
Sample
43d21e135859ecc1b67e1c599d1a1755d2aabee9e35063ff4f056ef96f8de13c.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
43d21e135859ecc1b67e1c599d1a1755d2aabee9e35063ff4f056ef96f8de13c.exe
Resource
win10v2004-20241007-en
General
-
Target
43d21e135859ecc1b67e1c599d1a1755d2aabee9e35063ff4f056ef96f8de13c
-
Size
713KB
-
MD5
fdd495aa140c9585374c84a70a9699ff
-
SHA1
7dc4d87c575d03672e840bb44893c8489dd4d463
-
SHA256
43d21e135859ecc1b67e1c599d1a1755d2aabee9e35063ff4f056ef96f8de13c
-
SHA512
c5b8710c922d3633a4d25fe117034418360df8e71177ba3436a53523c59c9cecc29179e942915e30290aa203c60beb8d649e0b5ee54b7338d24e5235288d06a0
-
SSDEEP
12288:38oWJCJY3DCEhwEiaYJVx4rdv1GV5uREe6TFgpEAMSgQ6nC8DEsLRhjKWYIBoFi:32oYGEhGa6VxUdtGrKEcAFQ6RRlBBoM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 43d21e135859ecc1b67e1c599d1a1755d2aabee9e35063ff4f056ef96f8de13c
Files
-
43d21e135859ecc1b67e1c599d1a1755d2aabee9e35063ff4f056ef96f8de13c.exe windows:5 windows x86 arch:x86
e8841d1185fc994bda7dc3cfde7e0860
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetDefaultCommConfigA
CreateMutexW
lstrcmpA
EnumCalendarInfoA
WriteConsoleInputW
EnumDateFormatsExW
CopyFileExW
VerSetConditionMask
GetConsoleAliasA
GetEnvironmentStringsW
GetModuleHandleExW
WaitForSingleObject
SetEvent
_lclose
GetProcessPriorityBoost
GetModuleHandleW
EnumCalendarInfoExW
GlobalAlloc
GetFirmwareEnvironmentVariableA
LoadLibraryW
SetMessageWaitingIndicator
GetStdHandle
IsDBCSLeadByteEx
SetLastError
GetProcAddress
GetComputerNameExW
SearchPathA
OpenWaitableTimerA
OpenMutexA
LocalAlloc
SetCalendarInfoW
BuildCommDCBAndTimeoutsW
SetConsoleOutputCP
WriteProfileSectionW
AddAtomA
EnumResourceTypesW
GetPrivateProfileSectionNamesA
FindFirstVolumeMountPointA
ContinueDebugEvent
FindNextFileW
GetStringTypeW
FatalAppExitA
GetCurrentThreadId
GetWindowsDirectoryW
DeleteFileA
EnumSystemLocalesA
GetLocaleInfoA
GetLastError
MoveFileA
HeapReAlloc
GetCommandLineA
HeapSetInformation
GetStartupInfoW
EncodePointer
DecodePointer
IsProcessorFeaturePresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
EnterCriticalSection
LeaveCriticalSection
HeapCreate
HeapDestroy
HeapFree
HeapAlloc
ExitProcess
WriteFile
GetModuleFileNameW
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
InterlockedDecrement
GetCurrentThread
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
RaiseException
Sleep
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
RtlUnwind
SetConsoleCtrlHandler
FreeLibrary
InterlockedExchange
GetLocaleInfoW
GetConsoleCP
GetConsoleMode
FlushFileBuffers
LCMapStringW
MultiByteToWideChar
SetFilePointer
HeapSize
CloseHandle
WriteConsoleW
SetStdHandle
CreateFileW
GetUserDefaultLCID
IsValidLocale
user32
LoadMenuA
Sections
.text Size: 112KB - Virtual size: 111KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 518KB - Virtual size: 39.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 82KB - Virtual size: 81KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ