Static task
static1
Behavioral task
behavioral1
Sample
d86de37980f92904ea06364cfe8a0e4b6a196a83fe44838f00d1702d1d58bef3.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
d86de37980f92904ea06364cfe8a0e4b6a196a83fe44838f00d1702d1d58bef3.exe
Resource
win10v2004-20231020-en
General
-
Target
d86de37980f92904ea06364cfe8a0e4b6a196a83fe44838f00d1702d1d58bef3
-
Size
240KB
-
MD5
24b4e7b871d7eb50d37b4941f5c1ae22
-
SHA1
7717b1d8931e3bf5e34bf6d8ce87001ad3881138
-
SHA256
d86de37980f92904ea06364cfe8a0e4b6a196a83fe44838f00d1702d1d58bef3
-
SHA512
dbbadd6143f1fc1a790f93da32e374fc469ed5a59aca29ec4cbd822d035852d089b7820753d3d5ca7675937fc04c74c11678fee7c1eb4f5b2638b6633ddfe5cd
-
SSDEEP
3072:qauzjwrCxrLCoZGDXN6Cocson12WRWQmgU2hT0nuKM5:qauzUJoZaXz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d86de37980f92904ea06364cfe8a0e4b6a196a83fe44838f00d1702d1d58bef3
Files
-
d86de37980f92904ea06364cfe8a0e4b6a196a83fe44838f00d1702d1d58bef3.exe windows:4 windows x64
9efd2decd4fba0fdaee6db0d9a5a3db6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
IsTextUnicode
RegCloseKey
RegCreateKeyExW
RegOpenKeyW
RegQueryValueExW
RegSetValueExW
comctl32
InitCommonControls
comdlg32
ChooseFontW
FindTextW
GetFileTitleW
GetOpenFileNameW
GetSaveFileNameW
PrintDlgW
ReplaceTextW
gdi32
CreateFontIndirectW
DeleteDC
DeleteObject
EndDoc
EndPage
ExtTextOutW
GetDeviceCaps
GetTextExtentExPointW
GetTextExtentPoint32W
GetTextMetricsW
SelectObject
SetMapMode
StartDocW
StartPage
kernel32
CloseHandle
CreateFileW
ExitProcess
FindClose
FindFirstFileW
FormatMessageW
GetCPInfoExW
GetCommandLineA
GetCommandLineW
GetDateFormatW
GetFileSize
GetLocalTime
GetModuleHandleA
GetStartupInfoA
GetTimeFormatW
HeapAlloc
HeapFree
LocalFree
MulDiv
MultiByteToWideChar
ReadFile
SetEndOfFile
WideCharToMultiByte
WriteFile
lstrcmpW
shell32
DragAcceptFiles
DragFinish
DragQueryFileW
ShellAboutW
shlwapi
PathFindFileNameW
StrCmpNIW
StrCmpNW
StrRStrIW
StrStrIW
StrStrW
wnsprintfW
ucrtbase
__p___argc
__p___argv
_assert
_configure_narrow_argv
_get_initial_narrow_environment
_initialize_narrow_environment
_set_app_type
exit
memcpy
memset
wcschr
user32
CheckMenuItem
CreateWindowExW
DefWindowProcW
DestroyWindow
DialogBoxParamW
DispatchMessageW
EnableMenuItem
EndDialog
GetClientRect
GetDlgItem
GetDlgItemInt
GetDlgItemTextW
GetMenu
GetMessageW
GetMonitorInfoW
GetParent
GetSystemMetrics
GetWindowPlacement
GetWindowTextLengthW
GetWindowTextW
InvalidateRect
IsClipboardFormatAvailable
IsDialogMessageW
LoadAcceleratorsW
LoadCursorW
LoadIconW
LoadImageW
LoadStringW
MessageBoxW
MonitorFromRect
PostMessageW
PostQuitMessage
RegisterClassExW
RegisterWindowMessageW
SendMessageW
SetActiveWindow
SetDlgItemInt
SetDlgItemTextW
SetFocus
SetWindowPos
SetWindowTextW
ShowWindow
TranslateAcceleratorW
TranslateMessage
UpdateWindow
WinHelpW
wsprintfW
Sections
.text Size: 24KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 544B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pdata Size: 4KB - Virtual size: 504B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xdata Size: 4KB - Virtual size: 532B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 4KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 184KB - Virtual size: 183KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ