Static task
static1
Behavioral task
behavioral1
Sample
3885589a3c94d0475a6d994e4644e682f4cff93f8b4d65f37508ffe706861363.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
3885589a3c94d0475a6d994e4644e682f4cff93f8b4d65f37508ffe706861363.exe
Resource
win10v2004-20240221-en
General
-
Target
3885589a3c94d0475a6d994e4644e682f4cff93f8b4d65f37508ffe706861363.bin
-
Size
453KB
-
MD5
248c960c1ae54103dea5bfae924f28e2
-
SHA1
504ce8efee0f7f8329c09c6d045a21c795a84b42
-
SHA256
3885589a3c94d0475a6d994e4644e682f4cff93f8b4d65f37508ffe706861363
-
SHA512
5b3dd4be33c48cedda5b9270a6454540e837e9611db4d43b35e7290ff7e25dd3b5c0342de6de38f12e8c7d5f291c62ef026236825134d1181e7ba5bdf8103464
-
SSDEEP
6144:/P2vVfY9RbTrI5Tm6oUAcEtKY/e8lmceEoAE77OvaHhdRwc9/P2wdAn7gJRKKRqX:aVw9prIVpb3F8ltQlBwc9/P2l7gT6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 3885589a3c94d0475a6d994e4644e682f4cff93f8b4d65f37508ffe706861363.bin
Files
-
3885589a3c94d0475a6d994e4644e682f4cff93f8b4d65f37508ffe706861363.bin.exe windows:6 windows x86 arch:x86
fed6080d5570a9033baa7765bc13e05e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
MessageBoxA
wsprintfW
DeferWindowPos
AnimateWindow
MessageBoxW
DestroyWindow
gdi32
SetPaletteEntries
SelectPalette
kernel32
MoveFileExA
GetWindowsDirectoryA
CreateFileA
GetFileSize
LocalAlloc
ReadFile
GetVersionExA
WriteFile
DeviceIoControl
OpenMutexW
CreateMutexW
lstrlenA
GetModuleHandleA
LoadLibraryA
CloseHandle
lstrcatA
GetProcAddress
VirtualQuery
TlsGetValue
VirtualProtect
IsBadReadPtr
WaitForSingleObject
VirtualFree
FreeLibrary
ExitProcess
TlsSetValue
lstrcmpA
OutputDebugStringW
VirtualAlloc
CreateTimerQueueTimer
Sleep
ExitThread
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetStdHandle
SetFilePointerEx
WriteConsoleW
lstrcpyA
RaiseException
GetStringTypeW
EncodePointer
DecodePointer
RtlUnwind
GetCommandLineA
IsProcessorFeaturePresent
HeapAlloc
CreateFileW
GetLastError
GetModuleHandleExW
MultiByteToWideChar
WideCharToMultiByte
HeapSize
HeapFree
SetLastError
GetCurrentThreadId
GetProcessHeap
GetStdHandle
GetFileType
DeleteCriticalSection
GetStartupInfoW
GetModuleFileNameA
GetModuleFileNameW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsFree
GetModuleHandleW
EnterCriticalSection
LeaveCriticalSection
IsDebuggerPresent
LoadLibraryExW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
HeapReAlloc
LCMapStringW
advapi32
EncryptionDisable
EqualDomainSid
LsaCreateTrustedDomainEx
LsaClose
AreAllAccessesGranted
InitializeSecurityDescriptor
LookupAccountSidW
secur32
LsaConnectUntrusted
Sections
.text Size: 71KB - Virtual size: 70KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 27KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 349KB - Virtual size: 357KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ