Static task
static1
Behavioral task
behavioral1
Sample
edb1e731c4edafa2aa7049979fc19187def806c6ed15af0ddfd08cc4fedd6dd6.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral2
Sample
edb1e731c4edafa2aa7049979fc19187def806c6ed15af0ddfd08cc4fedd6dd6.exe
Resource
win11-20240611-en
General
-
Target
edb1e731c4edafa2aa7049979fc19187def806c6ed15af0ddfd08cc4fedd6dd6
-
Size
191KB
-
MD5
36e0474f1cd6997d131963aaebec31d5
-
SHA1
09b9e618c15f3acbb1aac14c0122863438089422
-
SHA256
edb1e731c4edafa2aa7049979fc19187def806c6ed15af0ddfd08cc4fedd6dd6
-
SHA512
bb4b9a40b50694dae5b3a6cf87dc40c8d8dae1cb1775afc132ff755696be1483fdc33f35b934032d006766621e648aba4ba2c25d3dc9d6c3bf66f9fae909e35b
-
SSDEEP
3072:Rwnq9s5T+vEE2MBE2jCvWrv35F2dtM41zb3+4tASL/4GE5om1:Rw+eT+l/BEYhqdV7FtASLFeo
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource edb1e731c4edafa2aa7049979fc19187def806c6ed15af0ddfd08cc4fedd6dd6
Files
-
edb1e731c4edafa2aa7049979fc19187def806c6ed15af0ddfd08cc4fedd6dd6.exe windows:5 windows x86 arch:x86
4e95ddf93ca5962bf8da1a69883e9333
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
IsBadStringPtrW
GetConsoleAliasesLengthW
CommConfigDialogA
SetEndOfFile
FindResourceW
InterlockedDecrement
CreateDirectoryW
WriteConsoleInputA
TlsSetValue
GlobalFindAtomA
LoadLibraryW
ReplaceFileA
GlobalUnlock
SetLastError
GetProcAddress
SetFileAttributesA
LoadLibraryA
FindResourceA
AddVectoredExceptionHandler
GlobalGetAtomNameW
OpenJobObjectW
EnumResourceTypesW
GetOEMCP
OpenFileMappingW
TerminateJobObject
GetWindowsDirectoryW
HeapSize
HeapReAlloc
RtlUnwind
CreateFileA
LocalAlloc
GetDateFormatW
Sleep
EnterCriticalSection
MultiByteToWideChar
GetCommandLineA
HeapSetInformation
GetStartupInfoW
IsProcessorFeaturePresent
HeapAlloc
GetLastError
HeapFree
GetCPInfo
InterlockedIncrement
GetACP
IsValidCodePage
EncodePointer
TlsAlloc
TlsGetValue
DecodePointer
TlsFree
GetModuleHandleW
GetCurrentThreadId
SetUnhandledExceptionFilter
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameW
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
HeapCreate
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
UnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
LCMapStringW
GetStringTypeW
LeaveCriticalSection
RaiseException
user32
GetKeyboardLayoutNameA
SetMessageExtraInfo
GetCaretPos
InsertMenuItemW
GetClassInfoW
CharUpperBuffW
DdeKeepStringHandle
gdi32
GetTextMetricsA
GetCharWidthW
ole32
CoSuspendClassObjects
CoMarshalHresult
winhttp
WinHttpCheckPlatform
WinHttpWriteData
Sections
.text Size: 112KB - Virtual size: 112KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 44KB - Virtual size: 39.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ