Static task
static1
Behavioral task
behavioral1
Sample
dd40dbeb47316bbec5b23006c9fb2413a118b0990ca54166393a5c96cd277110.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
dd40dbeb47316bbec5b23006c9fb2413a118b0990ca54166393a5c96cd277110.exe
Resource
win10v2004-20230703-en
General
-
Target
dd40dbeb47316bbec5b23006c9fb2413a118b0990ca54166393a5c96cd277110
-
Size
5.2MB
-
MD5
04fdf1658aa4c971b531b645e799949f
-
SHA1
c10b6e2f36aa690c7fe6152bc5764dbfc7a5a66d
-
SHA256
dd40dbeb47316bbec5b23006c9fb2413a118b0990ca54166393a5c96cd277110
-
SHA512
a84b100c47f7b757995d92d4984a19c67781990ab1c8f17b99d65dd69f0db0978afdefbf99866ada189a96590ad81f652042550c9cd94a0e06d0707ed5324aad
-
SSDEEP
98304:n8qsyYpfQAjwPCaYV4iEZ3/WKHaH+O9Nf6PlvJeI0saKT0aeE23I9Vf7ujsCuhv:RRYldsPCaYV4isbjO7AVL053uf7rhv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource dd40dbeb47316bbec5b23006c9fb2413a118b0990ca54166393a5c96cd277110
Files
-
dd40dbeb47316bbec5b23006c9fb2413a118b0990ca54166393a5c96cd277110.exe windows x86
ac3cc626aba737db7cc1140f281b6100
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindNextFileA
GetDriveTypeA
FindFirstFileA
GetModuleFileNameA
GetProcAddress
FindClose
InterlockedDecrement
GetWindowsDirectoryA
GetDiskFreeSpaceA
InterlockedIncrement
FreeResource
FindResourceA
LoadResource
SizeofResource
LockResource
LocalAlloc
LocalLock
LocalUnlock
LocalFree
FreeLibrary
LoadLibraryA
GetVersion
WideCharToMultiByte
GetEnvironmentStringsW
IsBadCodePtr
IsBadWritePtr
IsBadReadPtr
SetUnhandledExceptionFilter
SetEnvironmentVariableW
RaiseException
SetCurrentDirectoryA
GetFullPathNameA
GetCurrentDirectoryA
RemoveDirectoryA
CreateDirectoryA
FileTimeToLocalFileTime
FileTimeToSystemTime
DeleteFileA
GetLocaleInfoW
GetTimeZoneInformation
GetLocaleInfoA
SetEnvironmentVariableA
CompareStringW
CompareStringA
SetEndOfFile
FlushFileBuffers
SetStdHandle
SetFilePointer
VirtualAlloc
GetStringTypeW
GetStringTypeA
LCMapStringW
GetLastError
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetCurrentThreadId
ExitProcess
SetFileAttributesA
GetFileAttributesA
MoveFileA
GetCPInfo
GetACP
GetOEMCP
HeapAlloc
TerminateProcess
GetCurrentProcess
HeapReAlloc
HeapSize
HeapFree
UnhandledExceptionFilter
FreeEnvironmentStringsA
MultiByteToWideChar
FreeEnvironmentStringsW
GetEnvironmentStrings
LCMapStringA
SetHandleCount
GetStdHandle
GetFileType
DeleteCriticalSection
TlsSetValue
TlsAlloc
SetLastError
TlsGetValue
HeapDestroy
HeapCreate
VirtualFree
RtlUnwind
WriteFile
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
CloseHandle
CreateFileA
GetCurrentProcessId
ReadFile
user32
DispatchMessageA
TranslateMessage
GetMessageA
PostThreadMessageA
DefWindowProcA
CreateWindowExA
RegisterClassA
DestroyWindow
PostQuitMessage
IsDialogMessageA
PeekMessageA
MessageBoxA
LoadStringA
SetWindowTextA
FindWindowA
GetSysColor
CharUpperA
CharPrevA
CharNextA
GetSystemMetrics
LoadIconA
SendMessageA
SendDlgItemMessageA
InvalidateRect
UpdateWindow
EndDialog
SystemParametersInfoA
GetParent
GetWindowRect
SetWindowPos
CreateDialogIndirectParamA
IsWindow
advapi32
RegOpenKeyExA
RegCreateKeyExA
RegCloseKey
RegDeleteKeyA
RegEnumKeyExA
gdi32
CreateSolidBrush
DeleteObject
SetBkColor
SetTextColor
comctl32
ord17
Sections
.text Size: 114KB - Virtual size: 114KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 15KB - Virtual size: 90KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5.0MB - Virtual size: 5.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rol Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE