Static task
static1
Behavioral task
behavioral1
Sample
a1d863b117044cc4f859824c5d6dfc04c9d9bd03820c5512cce4af50d39f9bea.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a1d863b117044cc4f859824c5d6dfc04c9d9bd03820c5512cce4af50d39f9bea.exe
Resource
win10v2004-20241007-en
General
-
Target
a1d863b117044cc4f859824c5d6dfc04c9d9bd03820c5512cce4af50d39f9bea
-
Size
695KB
-
MD5
de4eecc31e9cd208de42a4401c368dcd
-
SHA1
e1990dda0f9e347311519d35a485278a746bcfd3
-
SHA256
a1d863b117044cc4f859824c5d6dfc04c9d9bd03820c5512cce4af50d39f9bea
-
SHA512
d6cfbe46675c233f6c60e359fbcc3b1f5dc5e163a70a1de1807a249ca8062244090e0554e7bb24d5f29bbdae642cd66692f17948a78b3d8ddc5f3d624f7a40c7
-
SSDEEP
12288:wDHNPsYxmnaQz5I3qijZlMqCUfv06LeKPBQ2nocY77n0mRGCHjM6WIS:wFsla+wDRhhLeKPOEo/0mcyjM6WIS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource a1d863b117044cc4f859824c5d6dfc04c9d9bd03820c5512cce4af50d39f9bea
Files
-
a1d863b117044cc4f859824c5d6dfc04c9d9bd03820c5512cce4af50d39f9bea.exe windows:5 windows x86 arch:x86
aed1eee78711113ae66ee49e25fda31f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InterlockedIncrement
InterlockedDecrement
GetCurrentProcess
CreateJobObjectW
WriteConsoleInputA
GetComputerNameW
GetTimeFormatA
CallNamedPipeW
FreeEnvironmentStringsA
GetTickCount
GetCommConfig
GetNumberFormatA
ClearCommBreak
GetConsoleAliasExesW
EnumTimeFormatsA
TlsSetValue
GetCurrencyFormatW
SetFileShortNameW
LoadLibraryW
ReadConsoleInputA
IsBadCodePtr
SetVolumeMountPointA
CreateProcessW
GetFileAttributesW
GetModuleFileNameW
LCMapStringA
InterlockedExchange
GetLogicalDriveStringsA
GetLastError
SetLastError
GetProcAddress
VirtualAlloc
DefineDosDeviceW
GetDiskFreeSpaceW
LoadLibraryA
OpenJobObjectW
SetEnvironmentVariableA
GlobalWire
GlobalUnWire
GetCurrentDirectoryA
OpenEventW
GetShortPathNameW
SetFileAttributesW
GetVersionExW
GetTempFileNameW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
HeapAlloc
HeapReAlloc
GetStartupInfoW
GetModuleHandleW
Sleep
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
RaiseException
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
HeapFree
VirtualFree
HeapCreate
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
TlsGetValue
TlsAlloc
TlsFree
GetCurrentThreadId
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
IsDebuggerPresent
InitializeCriticalSectionAndSpinCount
GetModuleHandleA
RtlUnwind
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapSize
GetLocaleInfoA
WideCharToMultiByte
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
gdi32
GetCharWidth32A
winhttp
WinHttpOpen
msimg32
AlphaBlend
Sections
.text Size: 582KB - Virtual size: 582KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 23KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.cohav Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 82KB - Virtual size: 2.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ