Static task
static1
Behavioral task
behavioral1
Sample
24ee6d264364cc845a240c42297ebb8441d13b7f1fd26eb005cdac6e9a65b244.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
24ee6d264364cc845a240c42297ebb8441d13b7f1fd26eb005cdac6e9a65b244.exe
Resource
win10v2004-20231023-en
General
-
Target
24ee6d264364cc845a240c42297ebb8441d13b7f1fd26eb005cdac6e9a65b244
-
Size
8.6MB
-
MD5
ca099e036aab56068d0351796af85b79
-
SHA1
3b58abea1f0a27586ce224b489f4c1f014888576
-
SHA256
24ee6d264364cc845a240c42297ebb8441d13b7f1fd26eb005cdac6e9a65b244
-
SHA512
837ea766097ae6e8edd307cc6cf068db626ddfd4711d09185ef6b5b14cbc9703441092b86b6a2e7cad4ce93dd8f69e08f78f216f3c400d7c14f9b2676fdfeb67
-
SSDEEP
196608:3QjPDefBtk3a+NrG7gmyGyJEFAyXTfwn438Bru:3Qjr0fYa+NrYg/Gm0FXbwn4MR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 24ee6d264364cc845a240c42297ebb8441d13b7f1fd26eb005cdac6e9a65b244
Files
-
24ee6d264364cc845a240c42297ebb8441d13b7f1fd26eb005cdac6e9a65b244.exe windows:5 windows x86 arch:x86
d39001d2813b450e2ffb72ddcd966c2e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
user32
CharUpperA
gdi32
CreateCompatibleBitmap
msimg32
TransparentBlt
winspool.drv
ClosePrinter
advapi32
RegQueryValueA
shell32
DragQueryFileA
comctl32
InitCommonControlsEx
shlwapi
PathFindFileNameA
uxtheme
GetWindowTheme
ole32
OleGetClipboard
oleaut32
LoadRegTypeLi
oledlg
ord8
winmm
PlaySoundA
gdiplus
GdipSetInterpolationMode
oleacc
AccessibleObjectFromWindow
imm32
ImmGetContext
Sections
.text Size: 8.5MB - Virtual size: 14.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 110KB - Virtual size: 112KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE