Static task
static1
Behavioral task
behavioral1
Sample
b2f9c3002820fa654f514db1779c55a606ec8c164b744aacb9e886a7e1e7c4d9.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b2f9c3002820fa654f514db1779c55a606ec8c164b744aacb9e886a7e1e7c4d9.exe
Resource
win10v2004-20241007-en
General
-
Target
b2f9c3002820fa654f514db1779c55a606ec8c164b744aacb9e886a7e1e7c4d9
-
Size
273KB
-
MD5
5523f28f2224dde8d74286b09146bb47
-
SHA1
6bb034d638fcb055bf59afa3e93ac8dce25a3cf5
-
SHA256
b2f9c3002820fa654f514db1779c55a606ec8c164b744aacb9e886a7e1e7c4d9
-
SHA512
1d5b06d513befaae50e34493b0daa197fb9e4adb876db99aa1766026dad8e6004b24659de71763be47a31b1049c394b0876a7d3846d7827d2c0584deffdab1d0
-
SSDEEP
6144:+nNuJp9FtYk5k3uZElT63edWRK9Izm/sHgo2TW:+nMp9AYqtoKapHgo2a
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource b2f9c3002820fa654f514db1779c55a606ec8c164b744aacb9e886a7e1e7c4d9
Files
-
b2f9c3002820fa654f514db1779c55a606ec8c164b744aacb9e886a7e1e7c4d9.exe windows:6 windows x64 arch:x64
32fbf5b10b16ec517b227ff71a382b38
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
oleaut32
VariantClear
kernel32
EnumSystemLocalesEx
IsValidLocaleName
LCMapStringEx
GetUserDefaultLocaleName
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlCaptureContext
LoadLibraryExW
ReadConsoleW
SetStdHandle
WriteConsoleW
OutputDebugStringW
LocalFree
GetTickCount64
SetEndOfFile
GetConsoleMode
GetConsoleCP
FlushFileBuffers
SetFilePointerEx
GetThreadContext
GetTempFileNameW
GetFileSize
SetThreadContext
SetFilePointer
FreeLibrary
GetCurrentProcess
WaitForSingleObject
WriteFile
OpenProcess
GetSystemDirectoryW
LoadLibraryW
GetModuleFileNameW
CreateFileW
GetTempPathW
GetLastError
GetProcAddress
VirtualAllocEx
LoadLibraryA
GetModuleHandleA
lstrcatW
Wow64SetThreadContext
CloseHandle
WriteProcessMemory
ResumeThread
Wow64GetThreadContext
CreateThread
HeapAlloc
GetProcessHeap
Sleep
CreateRemoteThread
CreateToolhelp32Snapshot
VirtualProtectEx
VirtualProtect
ExitProcess
CreateMutexA
HeapReAlloc
CreateFileA
FindFirstFileW
MapViewOfFile
UnmapViewOfFile
CompareFileTime
HeapFree
GetModuleHandleW
GetProcessTimes
GetFileAttributesA
TerminateProcess
ReadFile
lstrcatA
MultiByteToWideChar
CreateDirectoryA
CopyFileA
SetFileAttributesA
Process32FirstW
CreateFileMappingA
GetModuleFileNameA
Process32NextW
IsDebuggerPresent
FindNextFileW
DeleteFileW
ExpandEnvironmentStringsW
WideCharToMultiByte
GetStringTypeW
EncodePointer
DecodePointer
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
GetLocaleInfoEx
GetCPInfo
IsProcessorFeaturePresent
GetSystemTimeAsFileTime
GetCommandLineW
RtlPcToFileHeader
RaiseException
RtlLookupFunctionEntry
RtlUnwindEx
InitializeCriticalSectionAndSpinCount
GetModuleHandleExW
HeapSize
IsValidCodePage
GetACP
GetOEMCP
SetLastError
GetCurrentThreadId
GetStdHandle
GetFileType
InitOnceExecuteOnce
GetStartupInfoW
Sections
.text Size: 126KB - Virtual size: 126KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 47KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 83KB - Virtual size: 94KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 808B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ