Static task
static1
Behavioral task
behavioral1
Sample
77a821f96ec1cf63b8615a896d893eaa97468eda611d5c57a6baf4fdb85925dbN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
77a821f96ec1cf63b8615a896d893eaa97468eda611d5c57a6baf4fdb85925dbN.exe
Resource
win10v2004-20241007-en
General
-
Target
77a821f96ec1cf63b8615a896d893eaa97468eda611d5c57a6baf4fdb85925dbN.exe
-
Size
148KB
-
MD5
9cd65170b6e0630d49797c652c4a6280
-
SHA1
7c593745ad77db16678c2d88d020ba06813faffe
-
SHA256
77a821f96ec1cf63b8615a896d893eaa97468eda611d5c57a6baf4fdb85925db
-
SHA512
90fbd985a04b7a2c4ca18bc1c88e9b16ad6735771b6e14c57742903e23ca42588d9a0a42412a8303551dcd8f7fece1ef8ae61e8413d2f2a92e1df82b1457f4dd
-
SSDEEP
3072:WVgq7obktKv+qu6rt4Kyy5GAV8VouOJgOsaaoi+:KgEM3uULyyQAVnvgH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 77a821f96ec1cf63b8615a896d893eaa97468eda611d5c57a6baf4fdb85925dbN.exe
Files
-
77a821f96ec1cf63b8615a896d893eaa97468eda611d5c57a6baf4fdb85925dbN.exe.exe windows:4 windows x86 arch:x86
b45f3a0fc1f733d393e1c398cf650e46
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetDriveTypeA
SetConsoleCtrlHandler
GetTimeZoneInformation
GetCurrentProcess
GetCommandLineA
IsBadWritePtr
GetStartupInfoA
GetFileAttributesA
ResumeThread
RtlUnwind
RaiseException
CreateThread
SetLocalTime
LocalFileTimeToFileTime
SetStdHandle
DuplicateHandle
QueryPerformanceCounter
FileTimeToLocalFileTime
EnterCriticalSection
GetModuleFileNameA
CreateFileW
UnlockFile
SetConsoleMode
GetExitCodeProcess
SetFilePointer
GetFullPathNameW
ReadFile
GetFileType
CreatePipe
GetConsoleMode
GetSystemDefaultLCID
ReadConsoleInputA
SetFileAttributesA
CloseHandle
GetCurrentDirectoryA
ReadConsoleA
GetLocalTime
VirtualFree
SetEnvironmentVariableA
GetCurrentThread
GetLogicalDrives
GetACP
LoadLibraryW
CreateDirectoryW
TlsAlloc
GetFileInformationByHandle
IsValidCodePage
SetCurrentDirectoryA
PeekConsoleInputA
SetFileAttributesW
MultiByteToWideChar
FindFirstFileA
FindFirstFileW
CreateFileA
GetLastError
FindNextFileW
FlushFileBuffers
GetEnvironmentStrings
GetDiskFreeSpaceA
IsBadCodePtr
InitializeCriticalSection
GetStdHandle
GetNumberOfConsoleInputEvents
GetCPInfo
SetFileTime
SetEndOfFile
LockFile
WaitForSingleObject
FreeLibrary
SetCurrentDirectoryW
SystemTimeToFileTime
LeaveCriticalSection
CreateDirectoryA
GetModuleHandleA
FindClose
GetFileAttributesW
FileTimeToSystemTime
Beep
SetEnvironmentVariableW
GetFullPathNameA
FindNextFileA
GetDriveTypeW
GetVersion
GetCurrentDirectoryW
WriteFile
GetModuleFileNameW
TlsGetValue
DeleteFileA
DeleteCriticalSection
GetProcAddress
GetUserDefaultLCID
GetSystemDefaultLangID
SetUnhandledExceptionFilter
WriteConsoleA
RemoveDirectoryA
TlsSetValue
RemoveDirectoryW
user32
MessageBoxA
Sections
.text Size: 84KB - Virtual size: 84KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ