Static task
static1
Behavioral task
behavioral1
Sample
1012ea9a9ad53ff3438058366404771c7995b404a6cf0a074f7f4f5b296b0612N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1012ea9a9ad53ff3438058366404771c7995b404a6cf0a074f7f4f5b296b0612N.exe
Resource
win10v2004-20241007-en
General
-
Target
1012ea9a9ad53ff3438058366404771c7995b404a6cf0a074f7f4f5b296b0612N
-
Size
1.5MB
-
MD5
92dcd66c5fa28c908374a51a47f82280
-
SHA1
3d4c2cdc87b7241db6b3f89d051ce095fba4c49e
-
SHA256
1012ea9a9ad53ff3438058366404771c7995b404a6cf0a074f7f4f5b296b0612
-
SHA512
b5b30f565f0707826e0e3cb51043411a6fd61e858eb87f719d8d46cf5e758cb40c7b7e1e7a106dba23effc1417e9739245d5a5e4539bc9ddef8691a801ba6f6a
-
SSDEEP
49152:rN2oCWRDIA4CRMT9B0jr4LpylrDEpdmEySStuPP8llijP:rNl4Cm2P4LpmAjySoWUlliT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1012ea9a9ad53ff3438058366404771c7995b404a6cf0a074f7f4f5b296b0612N
Files
-
1012ea9a9ad53ff3438058366404771c7995b404a6cf0a074f7f4f5b296b0612N.exe windows:5 windows x86 arch:x86
440d3db4faf888398573094fda651045
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleFileNameA
GetModuleHandleA
CloseHandle
DeleteFileA
GetFullPathNameA
GetThreadContext
GetCurrentThread
IsBadReadPtr
ExpandEnvironmentStringsA
WideCharToMultiByte
GetFileAttributesA
GetEnvironmentVariableA
MultiByteToWideChar
CreateDirectoryA
FindFirstFileA
CreateFileMappingA
RemoveDirectoryA
FindClose
LoadLibraryA
GetCurrentDirectoryA
GetCurrentProcessId
GetTempPathA
GetVolumeInformationW
MoveFileExA
CreateProcessW
SystemTimeToFileTime
WaitForSingleObject
GetExitCodeProcess
TerminateProcess
GetLastError
GetTempFileNameA
GetLocalTime
SetLastError
WriteFile
UnmapViewOfFile
MapViewOfFile
GetFileSize
GetProcAddress
CreateFileA
CreateFileW
HeapFree
HeapAlloc
GetCommandLineA
IsProcessorFeaturePresent
InterlockedDecrement
ExitProcess
GetModuleHandleExW
HeapSize
Sleep
GetStdHandle
GetModuleFileNameW
RaiseException
GetProcessHeap
IsDebuggerPresent
InterlockedIncrement
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCurrentThreadId
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
RtlUnwind
GetConsoleMode
SetFilePointerEx
GetFileType
DeleteCriticalSection
GetStartupInfoW
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
LoadLibraryExW
HeapReAlloc
OutputDebugStringW
LoadLibraryW
LCMapStringW
GetStringTypeW
GetConsoleCP
SetStdHandle
FlushFileBuffers
WriteConsoleW
VirtualQuery
advapi32
CheckTokenMembership
FreeSid
AllocateAndInitializeSid
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
shell32
ShellExecuteExW
Sections
.text Size: 125KB - Virtual size: 125KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ