Static task
static1
Behavioral task
behavioral1
Sample
1e7fb39c52ba502920d98374e0cdf8a2447c737bd0b88c06839e81be3a751688.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral2
Sample
1e7fb39c52ba502920d98374e0cdf8a2447c737bd0b88c06839e81be3a751688.exe
Resource
win11-20240508-en
General
-
Target
1e7fb39c52ba502920d98374e0cdf8a2447c737bd0b88c06839e81be3a751688
-
Size
211KB
-
MD5
1409b5a7ac2a6be45fa954730b058da4
-
SHA1
00eab66887ff6ff4d6325d8a0e74adb624faf6de
-
SHA256
1e7fb39c52ba502920d98374e0cdf8a2447c737bd0b88c06839e81be3a751688
-
SHA512
af224d8fda6b8c6df5aae108dc5d300fef45deab525109fc8d61498714d8b037bb63f2276e163c7997566c336fe6ed884b70282986e6ebab22bfbbe6071d5642
-
SSDEEP
3072:SIJoMdlOBVvu8OnD7F7CE4BOe3uqHh+JJGmkx8:/dlOrvg0E4wQQJ2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 1e7fb39c52ba502920d98374e0cdf8a2447c737bd0b88c06839e81be3a751688
Files
-
1e7fb39c52ba502920d98374e0cdf8a2447c737bd0b88c06839e81be3a751688.exe windows:5 windows x86 arch:x86
8e7bd8110819d537a004b803ccf06ec4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindResourceA
IsBadStringPtrW
GetConsoleAliasesLengthW
CommConfigDialogA
SetEndOfFile
FindResourceW
LoadLibraryExW
InterlockedIncrement
CreateDirectoryW
GlobalLock
GetWindowsDirectoryA
GlobalFindAtomA
LoadLibraryW
AssignProcessToJobObject
ReplaceFileA
SetLastError
GetProcAddress
RemoveVectoredExceptionHandler
LocalAlloc
GetDiskFreeSpaceA
GlobalGetAtomNameW
OpenJobObjectW
EnumResourceTypesW
GetOEMCP
OpenFileMappingA
SetFileAttributesW
CreateFileW
SetStdHandle
WriteConsoleW
CloseHandle
SetFilePointer
GetDateFormatW
LoadLibraryA
GetSystemDefaultLangID
MultiByteToWideChar
DecodePointer
EncodePointer
GetLastError
HeapReAlloc
GetModuleHandleW
ExitProcess
GetCommandLineA
HeapSetInformation
GetStartupInfoW
GetCPInfo
InterlockedDecrement
GetACP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThreadId
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
EnterCriticalSection
LeaveCriticalSection
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
HeapCreate
HeapFree
HeapAlloc
WriteFile
GetModuleFileNameW
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LCMapStringW
GetStringTypeW
Sleep
RtlUnwind
HeapSize
IsProcessorFeaturePresent
GetConsoleCP
GetConsoleMode
FlushFileBuffers
user32
OpenIcon
CharUpperBuffW
GetClassInfoW
GetKeyboardLayoutNameW
DdeCmpStringHandles
GetCaretPos
SetMessageExtraInfo
advapi32
AreAllAccessesGranted
ClearEventLogW
Sections
.text Size: 118KB - Virtual size: 117KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 44KB - Virtual size: 39.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 37KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ