Static task
static1
Behavioral task
behavioral1
Sample
f28e2ac900ef82c78a0c6628fa094ff52c5a7509eb84d98f58ffe106fd719200.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
f28e2ac900ef82c78a0c6628fa094ff52c5a7509eb84d98f58ffe106fd719200.exe
Resource
win10v2004-20241007-en
General
-
Target
f28e2ac900ef82c78a0c6628fa094ff52c5a7509eb84d98f58ffe106fd719200
-
Size
639KB
-
MD5
ff93ed92df73e1d58a601073ca91045e
-
SHA1
67c651043a8df387d2e22b55b7609b04d86073be
-
SHA256
f28e2ac900ef82c78a0c6628fa094ff52c5a7509eb84d98f58ffe106fd719200
-
SHA512
18c6a656270578694ed04b292cbaf860f242f419ebaa9ff55fc930872d9f4d1b45a006ae92a784b533c3028bfe33c5c1cbeba0d2e6e342d0049bb947261bdf23
-
SSDEEP
12288:hikkxcNc6rAiPcaVSty9hkc3gdgrEZGjRyy53t:hGqNcGdSu3gdfZ+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f28e2ac900ef82c78a0c6628fa094ff52c5a7509eb84d98f58ffe106fd719200
Files
-
f28e2ac900ef82c78a0c6628fa094ff52c5a7509eb84d98f58ffe106fd719200.exe windows:5 windows x86 arch:x86
40bbbed60883a9f9e6316bf7e9fc020f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetComputerNameA
SetProcessAffinityMask
GetNumaNodeProcessorMask
SetDefaultCommConfigA
GetLocaleInfoA
DebugActiveProcessStop
CallNamedPipeA
DeleteVolumeMountPointA
InterlockedIncrement
MoveFileExW
GetEnvironmentStringsW
Process32First
GlobalLock
GetTimeFormatA
SetCommBreak
FreeEnvironmentStringsA
GetModuleHandleW
FormatMessageA
GlobalAlloc
GetSystemWow64DirectoryW
GetConsoleAliasExesLengthW
GetFileAttributesA
GlobalFlags
HeapCreate
GetNamedPipeInfo
GetConsoleAliasW
SetConsoleCursorPosition
GetModuleFileNameW
GetConsoleFontSize
GetStringTypeExA
GetStartupInfoA
GetStdHandle
SetLastError
GetProcAddress
SetVolumeLabelW
VirtualAllocEx
BuildCommDCBW
GetNumaHighestNodeNumber
LoadLibraryA
UnhandledExceptionFilter
InterlockedExchangeAdd
OpenWaitableTimerW
MoveFileA
OpenJobObjectW
SetCommMask
FindAtomA
GetOEMCP
UpdateResourceW
OpenFileMappingW
GetVersionExA
ReadConsoleOutputCharacterW
LocalFileTimeToFileTime
CreateFileA
CloseHandle
WriteConsoleW
GetConsoleOutputCP
MultiByteToWideChar
HeapAlloc
GetCommandLineA
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
InterlockedDecrement
GetACP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
GetLastError
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
HeapFree
VirtualFree
VirtualAlloc
HeapReAlloc
Sleep
ExitProcess
WriteFile
GetModuleFileNameA
HeapSize
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
InitializeCriticalSectionAndSpinCount
RtlUnwind
SetFilePointer
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetStdHandle
WriteConsoleA
GetModuleHandleA
user32
LoadIconA
Sections
.text Size: 538KB - Virtual size: 537KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 19KB - Virtual size: 39.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 72KB - Virtual size: 71KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ