Static task
static1
Behavioral task
behavioral1
Sample
968bc7ff34c50875bcdc9702594cfb3fdf6e4a8df6e71922e8b696b6b0a5108eN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
968bc7ff34c50875bcdc9702594cfb3fdf6e4a8df6e71922e8b696b6b0a5108eN.exe
Resource
win10v2004-20241007-en
General
-
Target
968bc7ff34c50875bcdc9702594cfb3fdf6e4a8df6e71922e8b696b6b0a5108eN.exe
-
Size
495KB
-
MD5
57f7c831b49f8f36bfa78eb6f926b4d0
-
SHA1
076ba963ae01bd4ab0c408be8746ec18ed188363
-
SHA256
968bc7ff34c50875bcdc9702594cfb3fdf6e4a8df6e71922e8b696b6b0a5108e
-
SHA512
527c10ad6dae8ab895c876f52c019fbd7a3e520cc63dc20e2362e8cf4bc58aefd3e34a950e854567cedf8fd7e07bb9d1797a89632307c5ea324b238c1119fd5a
-
SSDEEP
12288:rVYT8EAmbt0A7Y85j9z54lIZwbyjDQxj2xlNU/CqoMip:rVQymh0kYJEGCDGMMfoHp
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 968bc7ff34c50875bcdc9702594cfb3fdf6e4a8df6e71922e8b696b6b0a5108eN.exe
Files
-
968bc7ff34c50875bcdc9702594cfb3fdf6e4a8df6e71922e8b696b6b0a5108eN.exe.exe windows:5 windows x86 arch:x86
52f2688274226e8e29c159bfb480bb47
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleExA
SetLocalTime
BuildCommDCBAndTimeoutsA
SetUnhandledExceptionFilter
WaitNamedPipeA
GlobalSize
GetEnvironmentStringsW
GetUserDefaultLCID
InterlockedCompareExchange
WriteConsoleInputA
SetEvent
CreateDirectoryExA
CallNamedPipeW
GetModuleHandleW
CreateRemoteThread
GetDateFormatA
WriteFile
FindActCtxSectionStringA
GetDriveTypeA
AllocateUserPhysicalPages
GlobalAlloc
GetSystemDirectoryW
ReadFileScatter
GetVersionExW
DnsHostnameToComputerNameW
FindNextVolumeW
GetConsoleAliasW
GetFileAttributesW
GetModuleFileNameW
EnumCalendarInfoA
FindNextVolumeMountPointW
EnumSystemLocalesA
GetConsoleOutputCP
OpenMutexW
SetLastError
GetProcAddress
GetComputerNameExW
LoadLibraryA
LocalAlloc
SetCalendarInfoW
RemoveDirectoryW
GlobalGetAtomNameW
GetCommMask
RtlCaptureStackBackTrace
GlobalFindAtomW
EnumResourceTypesW
FindNextFileA
GetModuleHandleA
EraseTape
CreateMutexA
GetStringTypeW
RequestWakeupLatency
ScrollConsoleScreenBufferA
GetVolumeNameForVolumeMountPointW
DeleteFileW
GetFileInformationByHandle
CloseHandle
HeapSize
MultiByteToWideChar
lstrcmpA
GetLastError
DeleteFileA
HeapReAlloc
GetCommandLineA
HeapSetInformation
GetStartupInfoW
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
DecodePointer
TlsFree
GetCurrentThreadId
GetCurrentThread
UnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
EnterCriticalSection
LeaveCriticalSection
HeapCreate
HeapDestroy
HeapFree
HeapAlloc
SetFilePointer
ExitProcess
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LCMapStringW
FatalAppExitA
Sleep
GetLocaleInfoW
GetLocaleInfoA
IsValidLocale
RtlUnwind
SetStdHandle
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetConsoleCtrlHandler
FreeLibrary
InterlockedExchange
LoadLibraryW
IsProcessorFeaturePresent
WriteConsoleW
CreateFileW
user32
GetMenu
advapi32
ReportEventA
Sections
.text Size: 109KB - Virtual size: 109KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 323KB - Virtual size: 4.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 61KB - Virtual size: 61KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ