Static task
static1
Behavioral task
behavioral1
Sample
14e132aad0c786082367c4af683faa76dbb45356965b0f1093753cdec3a2b08e.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
14e132aad0c786082367c4af683faa76dbb45356965b0f1093753cdec3a2b08e.exe
Resource
win10v2004-20240508-en
General
-
Target
14e132aad0c786082367c4af683faa76dbb45356965b0f1093753cdec3a2b08e
-
Size
691KB
-
MD5
94801476bc08359be42f9c749cdf3637
-
SHA1
f8a17073a45faf11d65fdd5aad601dcc437d5336
-
SHA256
14e132aad0c786082367c4af683faa76dbb45356965b0f1093753cdec3a2b08e
-
SHA512
5d802570d6a327c8cb181fce7ec15fc7b02729ac01e8893eed8d534bf1eca3261af0d88295daccc2cc06571de6c1aab8ac9e593a30ec3c212201ce61f05a6f7c
-
SSDEEP
12288:NyxkmO01+6w9wdlbS/o0rTCHJJ/KnE2ePt7cN3q6iynhXQpAwMj7b1vr:AamO0Mtwd5SwKCHJNeEPPt7cNY7AwM1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 14e132aad0c786082367c4af683faa76dbb45356965b0f1093753cdec3a2b08e
Files
-
14e132aad0c786082367c4af683faa76dbb45356965b0f1093753cdec3a2b08e.exe windows:5 windows x86 arch:x86
26b20b2808041724a94fb2624d73bdc4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateJobObjectW
GetModuleHandleExW
SleepEx
GetModuleHandleW
GetTickCount
GetConsoleAliasesA
ReadConsoleOutputA
GlobalAlloc
SetVolumeMountPointA
GetConsoleAliasExesLengthW
lstrcpynW
WriteConsoleW
GetModuleFileNameW
ZombifyActCtx
GetProcAddress
BuildCommDCBW
GetAtomNameA
LoadLibraryA
UnhandledExceptionFilter
InterlockedExchangeAdd
SetFileApisToANSI
AddAtomA
OpenJobObjectW
FoldStringA
lstrcatW
EnumDateFormatsW
FindFirstVolumeA
SetLastError
GetComputerNameA
CreateFileA
GetConsoleOutputCP
GetLastError
HeapFree
MultiByteToWideChar
GetStartupInfoW
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapCreate
VirtualFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
HeapAlloc
VirtualAlloc
HeapReAlloc
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
Sleep
HeapSize
ExitProcess
WriteFile
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeCriticalSectionAndSpinCount
RtlUnwind
LCMapStringA
WideCharToMultiByte
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
ReadFile
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetFilePointer
SetStdHandle
CloseHandle
WriteConsoleA
gdi32
GetBoundsRect
ole32
CoTaskMemAlloc
Sections
.text Size: 619KB - Virtual size: 619KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 34.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 54KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ