Static task
static1
Behavioral task
behavioral1
Sample
863c9b9679dc1646f5126b26c22bb3a3c5e10d15f89325716b33771483e2c7ba.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
863c9b9679dc1646f5126b26c22bb3a3c5e10d15f89325716b33771483e2c7ba.exe
Resource
win10v2004-20241007-en
General
-
Target
863c9b9679dc1646f5126b26c22bb3a3c5e10d15f89325716b33771483e2c7ba.exe
-
Size
238KB
-
MD5
48fc5bc1eecef40363586181076f17a0
-
SHA1
b731cda57251c807dc9fcb1f09e1ee41da52523c
-
SHA256
863c9b9679dc1646f5126b26c22bb3a3c5e10d15f89325716b33771483e2c7ba
-
SHA512
24ef5b3566fe5b02b7904bf0c9f38690550a851668b06c2892711b56903139ea2b6b0fa8eda261b6bad62b3c88901648adb4ce11cf0d6853d4b0c0b83f57fc0a
-
SSDEEP
3072:p0ef7i9FajzFgptNwf+jbjQE7f1tI/wTl53cMwd9ZGSwF:iefrjMtmW/ES8wTTwdPGSw
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 863c9b9679dc1646f5126b26c22bb3a3c5e10d15f89325716b33771483e2c7ba.exe
Files
-
863c9b9679dc1646f5126b26c22bb3a3c5e10d15f89325716b33771483e2c7ba.exe.exe windows:5 windows x86 arch:x86
17fedc67c91a23016ced8a879a1b9a8c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetDefaultCommConfigA
SearchPathW
SetLocaleInfoA
SetErrorMode
InterlockedIncrement
InterlockedDecrement
ReadConsoleOutputAttribute
GetEnvironmentStringsW
GetTimeFormatA
SetEvent
GetModuleHandleW
GetDateFormatA
GetCommandLineA
SetProcessPriorityBoost
LoadLibraryW
DeleteVolumeMountPointW
GetConsoleAliasW
GetStartupInfoA
SetLastError
GetProcAddress
SetFileAttributesA
BuildCommDCBW
GetNumaHighestNodeNumber
GetAtomNameA
LoadLibraryA
Process32Next
LocalAlloc
GetFileType
AddAtomW
AddAtomA
FoldStringA
CreatePipe
GetModuleHandleA
OpenFileMappingW
GetShortPathNameW
EndUpdateResourceA
GetVersionExA
FindFirstVolumeW
UnregisterWaitEx
HeapAlloc
MultiByteToWideChar
GetLastError
HeapReAlloc
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
HeapFree
VirtualFree
VirtualAlloc
HeapCreate
Sleep
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
SetHandleCount
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
HeapSize
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeCriticalSectionAndSpinCount
RtlUnwind
ReadFile
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetFilePointer
SetStdHandle
CloseHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
user32
GetProcessDefaultLayout
Sections
.text Size: 131KB - Virtual size: 131KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 28KB - Virtual size: 3.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 69KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ