Static task
static1
Behavioral task
behavioral1
Sample
7df55f408ab709a88f0804695248726517c71ab5040c19277feee0bf93f202b6.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
7df55f408ab709a88f0804695248726517c71ab5040c19277feee0bf93f202b6.exe
Resource
win11-20240508-en
General
-
Target
7df55f408ab709a88f0804695248726517c71ab5040c19277feee0bf93f202b6
-
Size
219KB
-
MD5
4cfe34deb03f3f627c793c47e2c5b615
-
SHA1
dfeffe31600df53c10728fd4345837a0beacae61
-
SHA256
7df55f408ab709a88f0804695248726517c71ab5040c19277feee0bf93f202b6
-
SHA512
71977d26c1c57f67262f76f1670b2ef4d2c11cc9ef2c64bb5de440d575e58babdde51dea451cc755eb6358d7f2b257e9932ead7f0733f746ec2dd2203eae8f56
-
SSDEEP
3072:ymk5pwID0GLTZH15ab6UzTomAJM88PF/L3eHHyxRHl:yzGQ0GLTZH15azzE/+LF/iyxR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 7df55f408ab709a88f0804695248726517c71ab5040c19277feee0bf93f202b6
Files
-
7df55f408ab709a88f0804695248726517c71ab5040c19277feee0bf93f202b6.exe windows:5 windows x86 arch:x86
a41cb227b532719e916aace9338b6342
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
IsBadStringPtrW
GetConsoleAliasesLengthW
CommConfigDialogA
SetEndOfFile
FindResourceW
InterlockedDecrement
CreateDirectoryW
WriteConsoleInputA
GetWindowsDirectoryA
TlsSetValue
GlobalFindAtomA
LoadLibraryW
ReplaceFileA
GlobalUnlock
SetLastError
GetProcAddress
SetFileAttributesA
FindResourceA
LoadLibraryA
LocalAlloc
AddVectoredExceptionHandler
GlobalGetAtomNameW
OpenJobObjectW
EnumResourceTypesW
GetOEMCP
OpenFileMappingW
TerminateJobObject
SetStdHandle
WriteConsoleW
CloseHandle
SetFilePointer
FlushFileBuffers
GetConsoleMode
GetConsoleCP
HeapReAlloc
CreateFileA
GetDiskFreeSpaceW
GetDateFormatW
RaiseException
HeapSize
MultiByteToWideChar
GetModuleHandleW
ExitProcess
DecodePointer
GetCommandLineA
HeapSetInformation
GetStartupInfoW
IsProcessorFeaturePresent
HeapAlloc
EnterCriticalSection
LeaveCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
TerminateProcess
GetCurrentProcess
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
GetLastError
HeapFree
GetCPInfo
InterlockedIncrement
GetACP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsFree
GetCurrentThreadId
WriteFile
GetModuleFileNameW
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapCreate
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
Sleep
RtlUnwind
LCMapStringW
GetStringTypeW
CreateFileW
user32
GetKeyboardLayoutNameA
SetMessageExtraInfo
GetCaretPos
InsertMenuItemW
GetClassInfoW
CharUpperBuffW
DdeKeepStringHandle
gdi32
GetTextMetricsA
GetCharWidthW
ole32
CoSuspendClassObjects
CoMarshalHresult
winhttp
WinHttpCheckPlatform
WinHttpWriteData
Sections
.text Size: 138KB - Virtual size: 137KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 45KB - Virtual size: 39.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ