Static task
static1
Behavioral task
behavioral1
Sample
fba4c64648bcf8ae8420dbf8b807cf40c15d1b7f3f17f0f39b033f5107fb3725.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fba4c64648bcf8ae8420dbf8b807cf40c15d1b7f3f17f0f39b033f5107fb3725.exe
Resource
win10v2004-20241007-en
General
-
Target
fba4c64648bcf8ae8420dbf8b807cf40c15d1b7f3f17f0f39b033f5107fb3725
-
Size
184KB
-
MD5
602e1783bbe11ead905dda65cda6e17a
-
SHA1
2de3fc71791ac98f34bfa6ff0a500e278e8a65bd
-
SHA256
fba4c64648bcf8ae8420dbf8b807cf40c15d1b7f3f17f0f39b033f5107fb3725
-
SHA512
b76ce506f2d33dc9aadc5ccb5695d2a070ad6d9e49baeb5e3c4f22e87745b8ce9839306c05d2695bdd85af4a78dce6e0c9031383ff6c54a0d3b028bca313620f
-
SSDEEP
3072:LLg/L7SGo/jco/NiDJi5eP6gTRX7Nct4sh173a1G5V5bVpJ:Lk/LO/ojHTRX7CtB3aIxVH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource fba4c64648bcf8ae8420dbf8b807cf40c15d1b7f3f17f0f39b033f5107fb3725
Files
-
fba4c64648bcf8ae8420dbf8b807cf40c15d1b7f3f17f0f39b033f5107fb3725.exe windows:5 windows x86 arch:x86
6ed3e1e1abd7428e917207642b1fc1f9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FreeEnvironmentStringsA
GetConsoleAliasesLengthA
GetCompressedFileSizeW
GlobalAlloc
GetLocaleInfoW
SetSystemTimeAdjustment
GetFileAttributesW
SetTimeZoneInformation
GetAtomNameW
GetModuleFileNameW
GetEnvironmentVariableA
GetVolumePathNameA
SetConsoleTitleA
WritePrivateProfileStringW
CreateJobObjectA
GetLastError
GetLongPathNameA
HeapSize
CreateJobSet
SetHandleInformation
CreateMemoryResourceNotification
GetAtomNameA
LoadLibraryA
GetProfileStringA
BeginUpdateResourceA
GetCommMask
GetModuleHandleA
VirtualProtect
GetCurrentDirectoryA
WaitForDebugEvent
SetCalendarInfoA
GetCurrentProcessId
SetFileAttributesW
LCMapStringW
CompareStringW
CompareStringA
GetTimeZoneInformation
ReadFile
GetProcessHeap
SetDefaultCommConfigW
InitializeSListHead
LoadResource
WriteConsoleOutputCharacterA
GetConsoleAliasExesLengthA
EnumDateFormatsExW
SetFilePointer
EnterCriticalSection
SetPriorityClass
GetStartupInfoW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
SetStdHandle
LeaveCriticalSection
GetFileType
WriteFile
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
HeapAlloc
RtlUnwind
HeapFree
GetModuleHandleW
Sleep
GetProcAddress
ExitProcess
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetStartupInfoA
DeleteCriticalSection
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
GetCurrentThread
HeapCreate
HeapDestroy
VirtualFree
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
FatalAppExitA
InitializeCriticalSectionAndSpinCount
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
MultiByteToWideChar
VirtualAlloc
HeapReAlloc
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
CloseHandle
CreateFileA
RaiseException
SetConsoleCtrlHandler
FreeLibrary
InterlockedExchange
LCMapStringA
GetStringTypeA
GetStringTypeW
GetTimeFormatA
GetDateFormatA
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
FlushFileBuffers
SetEndOfFile
SetEnvironmentVariableA
user32
GetMonitorInfoA
GetUserObjectInformationW
GetProcessDefaultLayout
GetClassLongW
gdi32
GetBoundsRect
advapi32
GetEventLogInformation
GetPrivateObjectSecurity
EqualSid
RegCreateKeyW
OpenEventLogW
PrivilegedServiceAuditAlarmW
Sections
.text Size: 140KB - Virtual size: 139KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ