Static task
static1
Behavioral task
behavioral1
Sample
dc01209e1da385103d7a5f9e993b1e079bedfdb6d4df02165724fee01962bb5f.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
dc01209e1da385103d7a5f9e993b1e079bedfdb6d4df02165724fee01962bb5f.exe
Resource
win10v2004-20240611-en
General
-
Target
dc01209e1da385103d7a5f9e993b1e079bedfdb6d4df02165724fee01962bb5f.exe
-
Size
311KB
-
MD5
4dccbf41f0e18a74c12363f7df4b42f4
-
SHA1
ed45004bdc194a163ae65d276a77e2f29a5087ca
-
SHA256
dc01209e1da385103d7a5f9e993b1e079bedfdb6d4df02165724fee01962bb5f
-
SHA512
7f7ccf8c89dce3752021c390b5248030b159886e2865f20382a9679f46f46e1efa0ccdbb7457755caf3bfc30d9efb8c4d343b90f35535781c51d0a0ff7c5c18e
-
SSDEEP
3072:6C406L974BzV04SWUgjjN9ij5b+q5kcr/56QQMZ2eD32YRcQTTeABNY:6Cd6L9MtK4Ts5Kq5kcrXQMT32wTK
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource dc01209e1da385103d7a5f9e993b1e079bedfdb6d4df02165724fee01962bb5f.exe
Files
-
dc01209e1da385103d7a5f9e993b1e079bedfdb6d4df02165724fee01962bb5f.exe.exe windows:5 windows x86 arch:x86
e084acefa2830b924f9e3b45256f4dfc
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateJobObjectW
SetCommBreak
GetCommProperties
GetModuleHandleW
GetTickCount
GetConsoleTitleA
ReadConsoleOutputA
ActivateActCtx
GlobalAlloc
LoadLibraryW
SetVolumeMountPointA
lstrcpynW
WriteConsoleW
GetConsoleAliasesW
GetLogicalDriveStringsA
OpenJobObjectA
GetProcAddress
SetFileApisToOEM
LoadLibraryA
UnhandledExceptionFilter
InterlockedExchangeAdd
LocalAlloc
AddAtomW
AddAtomA
FoldStringW
GetModuleFileNameA
lstrcatW
BuildCommDCBA
FindFirstVolumeW
EnumCalendarInfoExA
GetNumaProcessorNode
GetConsoleAliasExesLengthA
GetLastError
GetComputerNameA
MultiByteToWideChar
GetStartupInfoW
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
EnterCriticalSection
LeaveCriticalSection
WriteFile
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
FlushFileBuffers
DeleteCriticalSection
Sleep
HeapSize
ExitProcess
GetStdHandle
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
HeapCreate
VirtualFree
HeapFree
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
VirtualAlloc
HeapReAlloc
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
RtlUnwind
WriteConsoleA
GetConsoleOutputCP
SetFilePointer
SetStdHandle
InitializeCriticalSectionAndSpinCount
ReadFile
CreateFileA
CloseHandle
gdi32
GetCharWidth32W
advapi32
EnumDependentServicesW
ole32
CoTaskMemAlloc
Sections
.text Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 110KB - Virtual size: 109KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 23KB - Virtual size: 31.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 133KB - Virtual size: 132KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ