Static task
static1
Behavioral task
behavioral1
Sample
d9c2e6f0a087583e1d34825ab2cee93d6fc35ed4cb7b3c6830f22e718c59ac7d.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
d9c2e6f0a087583e1d34825ab2cee93d6fc35ed4cb7b3c6830f22e718c59ac7d.exe
Resource
win10v2004-20230703-en
General
-
Target
d9c2e6f0a087583e1d34825ab2cee93d6fc35ed4cb7b3c6830f22e718c59ac7d
-
Size
4.6MB
-
MD5
e4b46168e3ce938cc9aced56bd030a7d
-
SHA1
85ac2f846b7d924eb5ad6c7b78ed19fdef9514b2
-
SHA256
d9c2e6f0a087583e1d34825ab2cee93d6fc35ed4cb7b3c6830f22e718c59ac7d
-
SHA512
a0b4e8e1ed7c320f753a74151d59e7b16ce33029e5be81455330bfe10ad26ad6c6dafc97581602e7663efb8aab09098f85fd2ccf1fd863dfa6fca8fdc2513c31
-
SSDEEP
98304:y6s4V0IBbbO/J8gv1jDJcohgv1jDNs9WYLpdL2bkR98fQtLMjVGL:yy3PMqc1lhc1giIvFLMjYL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d9c2e6f0a087583e1d34825ab2cee93d6fc35ed4cb7b3c6830f22e718c59ac7d
Files
-
d9c2e6f0a087583e1d34825ab2cee93d6fc35ed4cb7b3c6830f22e718c59ac7d.exe windows x86
691015b925841ad138c8dabe6d23a67f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
winmm
midiStreamOut
ws2_32
WSAAsyncSelect
kernel32
SetFilePointer
user32
GetWindow
gdi32
PtVisible
winspool.drv
OpenPrinterA
advapi32
RegQueryValueExA
shell32
ShellExecuteA
ole32
OleRun
oleaut32
UnRegisterTypeLi
comctl32
ord17
comdlg32
ChooseColorA
msvcrt
strncpy
iphlpapi
GetInterfaceInfo
psapi
GetMappedFileNameW
Sections
.text Size: 3.3MB - Virtual size: 3.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.sedata Size: 1.0MB - Virtual size: 1.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 268KB - Virtual size: 268KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.sedata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ