Static task
static1
Behavioral task
behavioral1
Sample
87e8777acbbe49a81ccb388001948768d3884e8314841fdfa1bc168613f35926.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
87e8777acbbe49a81ccb388001948768d3884e8314841fdfa1bc168613f35926.exe
Resource
win10v2004-20240611-en
General
-
Target
87e8777acbbe49a81ccb388001948768d3884e8314841fdfa1bc168613f35926.exe
-
Size
316KB
-
MD5
0f0a906eb941529ee3a9c8328a62fe8c
-
SHA1
6a7af20f8037902a3e8e46c4c4179ffa6df0f014
-
SHA256
87e8777acbbe49a81ccb388001948768d3884e8314841fdfa1bc168613f35926
-
SHA512
301a03e4f90ebb6114cbbf83d28d846ad6589ec5ab091d76b4a564b080e24fb9aef217ee2494e9b44f690cb1ad046111f0e1f128fc6f1e5155aa8fc982fa98d2
-
SSDEEP
3072:huLL71XE8NVUNht81czMessWrTqC15snQQMZ2eD2sa3DHABNY:0LL7F7NCvtVI2wT1hQMT2s4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 87e8777acbbe49a81ccb388001948768d3884e8314841fdfa1bc168613f35926.exe
Files
-
87e8777acbbe49a81ccb388001948768d3884e8314841fdfa1bc168613f35926.exe.exe windows:5 windows x86 arch:x86
98d7401a8605cc815c6a51e567653589
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCommProperties
GetModuleHandleW
GetTickCount
GetConsoleTitleA
ReadConsoleOutputA
ActivateActCtx
GlobalAlloc
LoadLibraryW
SetVolumeMountPointA
lstrcpynW
WriteConsoleW
GetConsoleAliasesW
InterlockedExchange
GetLogicalDriveStringsA
CreateJobObjectW
GetProcAddress
SetFileApisToOEM
LoadLibraryA
UnhandledExceptionFilter
LocalAlloc
AddAtomA
FoldStringW
GetModuleFileNameA
lstrcatW
BuildCommDCBA
PurgeComm
FindFirstVolumeW
GlobalAddAtomW
EnumCalendarInfoExA
GetNumaNodeProcessorMask
GetConsoleAliasExesLengthA
GetLastError
GetComputerNameA
MultiByteToWideChar
GetStartupInfoW
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
EnterCriticalSection
LeaveCriticalSection
WriteFile
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
FlushFileBuffers
DeleteCriticalSection
Sleep
HeapSize
ExitProcess
GetStdHandle
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
HeapCreate
VirtualFree
HeapFree
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
VirtualAlloc
HeapReAlloc
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
RtlUnwind
WriteConsoleA
GetConsoleOutputCP
SetFilePointer
SetStdHandle
InitializeCriticalSectionAndSpinCount
ReadFile
CreateFileA
CloseHandle
GetModuleHandleA
gdi32
GetCharWidth32W
advapi32
EnumDependentServicesW
ole32
CoTaskMemFree
Sections
.text Size: 56KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 110KB - Virtual size: 110KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 31.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 123KB - Virtual size: 123KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ