Static task
static1
Behavioral task
behavioral1
Sample
684f14b76db0a0750378245c6a8dc89090f72ea2391382acb46bd84689362420.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
684f14b76db0a0750378245c6a8dc89090f72ea2391382acb46bd84689362420.exe
Resource
win10v2004-20241007-en
General
-
Target
684f14b76db0a0750378245c6a8dc89090f72ea2391382acb46bd84689362420.exe
-
Size
693KB
-
MD5
afe6edb128b3c63af38609163be7f95a
-
SHA1
e28375ff17b5d3ba26cca8c13421bf404159188b
-
SHA256
684f14b76db0a0750378245c6a8dc89090f72ea2391382acb46bd84689362420
-
SHA512
6e3c31c094888bc48576ea6074bd111db77cd4b8ef584e3496a272c147a6fe49e8c022d5889d1525357663292e982267d76065d8bc75a0dca5ec1fa3bdb59c8b
-
SSDEEP
12288:nCl1NjRH8g0NYx+jhZSE0dtLobqx/gytXSxJ6/K2ucGbSLRR6P:nSRH8vNw2r0AEo4XSxMCqcS+P
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 684f14b76db0a0750378245c6a8dc89090f72ea2391382acb46bd84689362420.exe
Files
-
684f14b76db0a0750378245c6a8dc89090f72ea2391382acb46bd84689362420.exe.exe windows:5 windows x86 arch:x86
0c7d5e3cc418522bc761bfea9cf074f4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetPrivateProfileSectionNamesW
SetDefaultCommConfigA
CreateMutexW
EnumCalendarInfoA
GetStringTypeA
GlobalCompact
_llseek
VerSetConditionMask
GetConsoleAliasA
WritePrivateProfileSectionA
WriteConsoleInputA
BackupSeek
GetModuleHandleW
EnumTimeFormatsW
GlobalAlloc
LoadLibraryW
TerminateThread
ReadConsoleInputA
GetSystemWindowsDirectoryA
GetFileAttributesA
TransactNamedPipe
IsDBCSLeadByte
lstrcmpW
GlobalUnlock
DeactivateActCtx
FindFirstFileA
SetLastError
GetProcAddress
GetFirmwareEnvironmentVariableW
EnterCriticalSection
GlobalGetAtomNameA
SearchPathA
ResetEvent
OpenWaitableTimerA
GetProcessId
LocalAlloc
SetCalendarInfoW
BuildCommDCBAndTimeoutsW
FindFirstVolumeMountPointW
SetCurrentDirectoryW
AddAtomA
WaitForMultipleObjects
EnumResourceTypesW
FindNextFileA
FreeEnvironmentStringsW
GetCPInfoExA
DeleteFileW
EnumCalendarInfoExA
CopyFileExA
CloseHandle
WriteConsoleW
GetLastError
WideCharToMultiByte
HeapAlloc
DeleteFileA
GetCommandLineA
HeapSetInformation
GetStartupInfoW
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
DecodePointer
TlsFree
GetCurrentThreadId
GetCurrentThread
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameW
HeapCreate
HeapDestroy
LeaveCriticalSection
SetFilePointer
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
GetModuleFileNameA
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LCMapStringW
MultiByteToWideChar
GetStringTypeW
FatalAppExitA
HeapFree
Sleep
IsProcessorFeaturePresent
GetLocaleInfoW
SetConsoleCtrlHandler
FreeLibrary
InterlockedExchange
SetStdHandle
GetConsoleCP
GetConsoleMode
FlushFileBuffers
RtlUnwind
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
HeapReAlloc
HeapSize
CreateFileW
user32
LoadMenuW
Sections
.text Size: 85KB - Virtual size: 85KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 518KB - Virtual size: 39.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 88KB - Virtual size: 87KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ