Static task
static1
Behavioral task
behavioral1
Sample
02424573504f9dcdb30f15534a402854.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
02424573504f9dcdb30f15534a402854.exe
Resource
win10v2004-20231215-en
General
-
Target
02424573504f9dcdb30f15534a402854
-
Size
438KB
-
MD5
02424573504f9dcdb30f15534a402854
-
SHA1
9e49148f0a07914b1631b78781504145210c7d39
-
SHA256
2dd33d8689cee6e7e49c531da77f94958b7ee1c3ed1aa3ffce17859ca4f40e4f
-
SHA512
d49e8df31cd6cd75af17861b4fd93a55b8261612249c7a56a386311b4f9bbb660ee730d9d2d45bc29db406e0044e1d4377be52c126c576ccd228175f0a849746
-
SSDEEP
12288:apJnZKk8Lhta5j0h4rKPg+WEDN/DoZTADHxUL3ijvv7:KskCtaOhP4+WEDN/kELU4v
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 02424573504f9dcdb30f15534a402854
Files
-
02424573504f9dcdb30f15534a402854.exe windows:4 windows x86 arch:x86
80dd4e9dfb8359d20a703cb8dd59a861
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
EnumSystemLocalesA
GetTimeZoneInformation
WaitNamedPipeW
ReleaseMutex
GetProcessHeap
GetEnvironmentStrings
HeapAlloc
LoadLibraryA
TlsAlloc
LeaveCriticalSection
TlsSetValue
ReleaseSemaphore
SetCurrentDirectoryW
FreeLibrary
SetUnhandledExceptionFilter
Sleep
FreeEnvironmentStringsA
GetStringTypeA
GetStringTypeW
WriteConsoleA
SetHandleCount
GetCurrentThread
GetTimeFormatA
GetDateFormatA
SetConsoleCursorInfo
HeapCreate
TlsGetValue
GetStdHandle
GetProcAddress
CompareStringA
GetStartupInfoA
WideCharToMultiByte
FindFirstFileExA
GetCommandLineA
lstrcpynW
HeapDestroy
VirtualQuery
LCMapStringW
VirtualFree
SetConsoleCtrlHandler
FreeEnvironmentStringsW
InitializeCriticalSection
TlsFree
GetOEMCP
HeapReAlloc
LCMapStringA
ExitProcess
FillConsoleOutputCharacterA
RaiseException
VirtualAlloc
WriteFile
QueryPerformanceCounter
GetCurrentProcess
IsDebuggerPresent
GetModuleHandleA
GetLastError
InterlockedDecrement
InterlockedIncrement
GetCurrentThreadId
SetEnvironmentVariableA
UnhandledExceptionFilter
GetCPInfo
GetLocaleInfoA
GetCurrentProcessId
GetModuleFileNameA
IsValidCodePage
GetACP
FindFirstFileW
GetTickCount
GetVersionExA
EnterCriticalSection
GetFileType
SetLastError
MultiByteToWideChar
RtlUnwind
GetEnvironmentStringsW
GetSystemTimeAsFileTime
InterlockedExchange
IsValidLocale
DeleteCriticalSection
CompareStringW
GetLocaleInfoW
DebugActiveProcess
GetUserDefaultLCID
HeapSize
HeapFree
TerminateProcess
comdlg32
GetSaveFileNameW
ChooseColorA
GetFileTitleW
ReplaceTextW
LoadAlterBitmap
FindTextA
FindTextW
shell32
ShellExecuteA
DragQueryPoint
SheChangeDirExW
CheckEscapesW
SHGetFileInfo
SHGetDiskFreeSpaceA
RealShellExecuteA
SHFileOperationW
ShellExecuteEx
FindExecutableA
SHGetDataFromIDListW
SHGetPathFromIDList
SHLoadInProc
SheSetCurDrive
ExtractIconEx
ExtractAssociatedIconExA
SHUpdateRecycleBinIcon
DragQueryFileAorW
SHGetSpecialFolderPathA
SHGetPathFromIDListW
ShellExecuteW
user32
EnumPropsA
InsertMenuA
GetOpenClipboardWindow
wsprintfA
GetDCEx
FlashWindow
CharLowerBuffA
DrawAnimatedRects
IsCharLowerW
EnumDesktopWindows
GetClipboardFormatNameA
OpenInputDesktop
UnregisterHotKey
UnhookWinEvent
GetMessageExtraInfo
IsCharAlphaNumericA
Sections
.text Size: 116KB - Virtual size: 116KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 310KB - Virtual size: 341KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ