Static task
static1
Behavioral task
behavioral1
Sample
31fda96a9d878c156def6e2e191892af78ec3034447718513a6dd7b3964b9f54.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
31fda96a9d878c156def6e2e191892af78ec3034447718513a6dd7b3964b9f54.exe
Resource
win10v2004-20241007-en
General
-
Target
31fda96a9d878c156def6e2e191892af78ec3034447718513a6dd7b3964b9f54.exe
-
Size
589KB
-
MD5
fd7697e7d6e69fc0ef0a5e88881c3480
-
SHA1
44839cf06d31f661408a68e14f84d0c90df3cff2
-
SHA256
31fda96a9d878c156def6e2e191892af78ec3034447718513a6dd7b3964b9f54
-
SHA512
043d91805cf9c9db07e4112371fd463eb162b9281774921bbc96f7f8be2def7fdef151f643f1a16ad489fb7c984c3ce110096cf355529ef94c425025cd44c169
-
SSDEEP
12288:17FjjiyM2OVN7/DTX87JSd9yQYEyT8IZHI:xFfisOH73P90ESI
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 31fda96a9d878c156def6e2e191892af78ec3034447718513a6dd7b3964b9f54.exe
Files
-
31fda96a9d878c156def6e2e191892af78ec3034447718513a6dd7b3964b9f54.exe.exe windows:5 windows x86 arch:x86
623b9e70c45708f203e89c3c79d42d54
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
EnumCalendarInfoA
GetStringTypeA
GetDriveTypeW
GlobalCompact
GetConsoleAliasExesLengthA
BuildCommDCBAndTimeoutsA
InterlockedIncrement
EnumCalendarInfoW
GetCommState
ZombifyActCtx
GetNamedPipeHandleStateA
GetModuleHandleW
GetTickCount
GetConsoleTitleA
EnumResourceTypesA
SetProcessPriorityBoost
GetEnvironmentStrings
GlobalAlloc
LoadLibraryW
GetConsoleWindow
InterlockedPopEntrySList
GetFileAttributesA
SetConsoleMode
GetFileAttributesW
GetBinaryTypeW
GetOverlappedResult
GetVolumePathNameA
FindNextVolumeMountPointW
SetTapePosition
GetStringTypeExA
GetPrivateProfileIntW
GlobalUnfix
GetLastError
GetProcAddress
CreateJobSet
RemoveDirectoryA
SetComputerNameA
UnhandledExceptionFilter
GetConsoleScreenBufferInfo
LocalAlloc
BeginUpdateResourceA
SetThreadIdealProcessor
GetPrivateProfileStructA
GetModuleFileNameA
FindNextFileA
CreateMutexA
FreeEnvironmentStringsW
EnumDateFormatsW
GetCPInfoExA
SetCalendarInfoA
SetFileShortNameA
TerminateJobObject
FindAtomW
QueryDepthSList
MoveFileWithProgressW
DebugBreak
EnumSystemLocalesW
DeleteFileA
SetFilePointer
WriteConsoleW
FlushFileBuffers
WideCharToMultiByte
InterlockedDecrement
InterlockedCompareExchange
InterlockedExchange
MultiByteToWideChar
GetStringTypeW
EncodePointer
DecodePointer
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapFree
HeapAlloc
GetCommandLineA
HeapSetInformation
GetStartupInfoW
GetCPInfo
RaiseException
RtlUnwind
LCMapStringW
HeapCreate
HeapDestroy
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameW
HeapSize
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
GetCurrentThread
CloseHandle
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetLocaleInfoW
IsProcessorFeaturePresent
FatalAppExitA
GetACP
GetOEMCP
IsValidCodePage
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
HeapReAlloc
SetConsoleCtrlHandler
FreeLibrary
SetStdHandle
GetConsoleCP
GetConsoleMode
CreateFileW
user32
DefDlgProcA
GetMenu
Sections
.text Size: 147KB - Virtual size: 147KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 322KB - Virtual size: 4.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 118KB - Virtual size: 118KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ