Static task
static1
Behavioral task
behavioral1
Sample
a0a89141941e64f36ee9c0dcadd6a0e1cbe813608270908025dc7d26ef15bb6a.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral2
Sample
a0a89141941e64f36ee9c0dcadd6a0e1cbe813608270908025dc7d26ef15bb6a.exe
Resource
win11-20240611-en
General
-
Target
a0a89141941e64f36ee9c0dcadd6a0e1cbe813608270908025dc7d26ef15bb6a
-
Size
273KB
-
MD5
c3db22b12e9f6dc730cf023097b7e74e
-
SHA1
f2b06c87d2f0862852116ba9199b2c23a347a362
-
SHA256
a0a89141941e64f36ee9c0dcadd6a0e1cbe813608270908025dc7d26ef15bb6a
-
SHA512
5b98fddb04537ad0d8c39b3570c1fc00caffbfb661828b4fccfac50eafd5a22352719c32084bd495f8a11806bc8c4328822263cd03449459cfec959a5c90efe3
-
SSDEEP
3072:sDILcO9f3/+YiWmdghXj0HIBb8a+5dge/qjQkATlTzXmZFqNsyKHm:1LcONv+7nihXjEIN8apbj8zXmZQL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource a0a89141941e64f36ee9c0dcadd6a0e1cbe813608270908025dc7d26ef15bb6a
Files
-
a0a89141941e64f36ee9c0dcadd6a0e1cbe813608270908025dc7d26ef15bb6a.exe windows:5 windows x86 arch:x86
add5b12dac4e6ed7ab64a15ab04a2c5e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetVolumeMountPointW
GetComputerNameW
SleepEx
GetCommProperties
GetModuleHandleW
GetTickCount
EnumCalendarInfoExW
GlobalAlloc
LoadLibraryW
WriteConsoleOutputA
lstrcpynW
GetModuleFileNameW
CreateJobObjectA
GetConsoleAliasesW
GetLogicalDriveStringsW
GetProcAddress
BuildCommDCBW
GetAtomNameA
LoadLibraryA
WriteConsoleA
UnhandledExceptionFilter
InterlockedExchangeAdd
AddAtomW
FoldStringA
lstrcatW
GetConsoleTitleW
FindFirstVolumeA
AreFileApisANSI
OpenJobObjectA
ZombifyActCtx
GetLastError
GetConsoleAliasExesLengthA
CreateFileA
WriteConsoleW
MultiByteToWideChar
HeapAlloc
HeapReAlloc
GetStartupInfoW
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
HeapFree
VirtualFree
VirtualAlloc
HeapCreate
Sleep
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
SetHandleCount
GetFileType
GetStartupInfoA
HeapSize
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
LCMapStringA
WideCharToMultiByte
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
InitializeCriticalSectionAndSpinCount
RtlUnwind
ReadFile
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetFilePointer
SetStdHandle
CloseHandle
GetConsoleOutputCP
gdi32
GetBoundsRect
advapi32
EnumDependentServicesA
ole32
CoTaskMemRealloc
winhttp
WinHttpAddRequestHeaders
Sections
.text Size: 34KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 110KB - Virtual size: 110KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 31.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 120KB - Virtual size: 119KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ