Static task
static1
Behavioral task
behavioral1
Sample
Trojan-Downloader.Win32.Agent.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Trojan-Downloader.Win32.Agent.exe
Resource
win10v2004-20240226-en
General
-
Target
Trojan-Downloader.Win32.Agent.hdye-346cb074536b6d01dd7b73e5ffba9074624250b72dc5b5b6378edcb04fa38895
-
Size
38KB
-
MD5
ce64740aaf18f3f7bd755dffd3529ed3
-
SHA1
a48e81b30b9e4f78c99672dbd3394c4e7463078a
-
SHA256
346cb074536b6d01dd7b73e5ffba9074624250b72dc5b5b6378edcb04fa38895
-
SHA512
a69d20273c6f891816dae4b227b30c7552fee1e11f0687316537340db3442943f959c05dfa07d8e87fd47095b77083e7436195ead75f75af94581fa681b1e2bd
-
SSDEEP
384:6YwzAbTtITikpqIoxO6kAr+3EvF+3d5wOlFQSHpalsdmiY7akaH6lk+Ym+cNjRs8:yAHt0V5dFlSSJaadF0ak6+fXNlskjZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Trojan-Downloader.Win32.Agent.hdye-346cb074536b6d01dd7b73e5ffba9074624250b72dc5b5b6378edcb04fa38895
Files
-
Trojan-Downloader.Win32.Agent.hdye-346cb074536b6d01dd7b73e5ffba9074624250b72dc5b5b6378edcb04fa38895.exe windows:5 windows x86 arch:x86
c585d9b7637cb43fc6a3b820441b7ebb
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetDC
ReleaseDC
CreateCursor
DestroyCursor
ShowCursor
AppendMenuA
DrawTextExA
CharUpperA
CreateAcceleratorTableA
DrawEdge
GetClientRect
RegisterWindowMessageA
MoveWindow
DragDetect
GetCapture
CreateDialogIndirectParamA
ReleaseCapture
FindWindowA
kernel32
lstrlen
SetLastError
GetCommandLineA
GetStartupInfoA
ExitProcess
HeapFree
GetModuleHandleA
lstrlenA
MapViewOfFile
HeapDestroy
MultiByteToWideChar
CreateDirectoryA
ole32
CoInitialize
CoUninitialize
CoCreateInstanceEx
oleaut32
SysAllocStringLen
SysFreeString
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ