Static task
static1
Behavioral task
behavioral1
Sample
1.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
1.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
1.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral4
Sample
1.exe
Resource
win11-20240611-en
General
-
Target
1.exe
-
Size
210KB
-
MD5
4e44bde7f6f84e7ce196f0e50c1e7f92
-
SHA1
eaeef05bdb27936123080a9f7d40f463676be208
-
SHA256
19cd5aee7659c7f0acede05ea290754cc649e72929f66b9c6903fa2c8da0d1cd
-
SHA512
06f9ca3d6c6a928a586f5b09c5cfe13c5348c45dbbb047da7fb60caf8a6b710ec3dfd5854b3e1a29b777cca2c573b261f7716edbc5d495b56542d014e4715b14
-
SSDEEP
3072:quWoMdlOhv3B1lvqWRSFbr4ZDvuWwvE4lXihNWoH2pA8:ydlO5nliH4oWwBiM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 1.exe
Files
-
1.exe.exe windows:5 windows x86 arch:x86
8e7bd8110819d537a004b803ccf06ec4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindResourceA
IsBadStringPtrW
GetConsoleAliasesLengthW
CommConfigDialogA
SetEndOfFile
FindResourceW
LoadLibraryExW
InterlockedIncrement
CreateDirectoryW
GlobalLock
GetWindowsDirectoryA
GlobalFindAtomA
LoadLibraryW
AssignProcessToJobObject
ReplaceFileA
SetLastError
GetProcAddress
RemoveVectoredExceptionHandler
LocalAlloc
GetDiskFreeSpaceA
GlobalGetAtomNameW
OpenJobObjectW
EnumResourceTypesW
GetOEMCP
OpenFileMappingA
SetFileAttributesW
CreateFileW
SetStdHandle
WriteConsoleW
CloseHandle
SetFilePointer
GetDateFormatW
LoadLibraryA
GetSystemDefaultLangID
MultiByteToWideChar
DecodePointer
EncodePointer
GetLastError
HeapReAlloc
GetModuleHandleW
ExitProcess
GetCommandLineA
HeapSetInformation
GetStartupInfoW
GetCPInfo
InterlockedDecrement
GetACP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThreadId
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
EnterCriticalSection
LeaveCriticalSection
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
HeapCreate
HeapFree
HeapAlloc
WriteFile
GetModuleFileNameW
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LCMapStringW
GetStringTypeW
Sleep
RtlUnwind
HeapSize
IsProcessorFeaturePresent
GetConsoleCP
GetConsoleMode
FlushFileBuffers
user32
OpenIcon
CharUpperBuffW
GetClassInfoW
GetKeyboardLayoutNameW
DdeCmpStringHandles
GetCaretPos
SetMessageExtraInfo
advapi32
AreAllAccessesGranted
ClearEventLogW
Sections
.text Size: 116KB - Virtual size: 116KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 44KB - Virtual size: 39.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 37KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ