Static task
static1
Behavioral task
behavioral1
Sample
f4414fd38f14c87111b43de3eee773ac1e623f4e3e90edbf1105bc56e0d21828.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f4414fd38f14c87111b43de3eee773ac1e623f4e3e90edbf1105bc56e0d21828.exe
Resource
win10v2004-20240226-en
General
-
Target
f4414fd38f14c87111b43de3eee773ac1e623f4e3e90edbf1105bc56e0d21828
-
Size
205KB
-
MD5
69aac64c391c32e8c806478a5df765e0
-
SHA1
8454551ea6f96239a486d935440f4967016be5a8
-
SHA256
f4414fd38f14c87111b43de3eee773ac1e623f4e3e90edbf1105bc56e0d21828
-
SHA512
6a2ac775f64d881db987e4e19d04c677b6879ed6fa1b02829b5d49a8d71899a10346f72d49cd00304bac5cd1492cf2a7cc85e4305408ed53320c3aa477dccaa8
-
SSDEEP
6144:MSDDT7cqUTwsXn5ZPxyQZudimLbVC7jsfuTTDI1:9wqEX5ZPxyQZu90nsfCT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f4414fd38f14c87111b43de3eee773ac1e623f4e3e90edbf1105bc56e0d21828
Files
-
f4414fd38f14c87111b43de3eee773ac1e623f4e3e90edbf1105bc56e0d21828.exe windows:4 windows x86 arch:x86
c3dfda8b1a697f6806dd2a9824d40464
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetEndOfFile
GetCommandLineA
GetACP
GetVersion
SetHandleCount
GetFileInformationByHandle
CloseHandle
CreateFileA
HeapFree
HeapAlloc
GetLastError
FindFirstFileA
FindNextFileA
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
ExitProcess
TerminateProcess
GetCurrentProcess
CreateDirectoryA
HeapReAlloc
MoveFileA
DeleteFileA
GetFileType
WriteFile
GetStdHandle
GetModuleFileNameA
SetFilePointer
SetStdHandle
SetConsoleCtrlHandler
ReadFile
GetFileAttributesA
GetProcAddress
GetModuleHandleA
RtlUnwind
UnhandledExceptionFilter
FreeEnvironmentStringsA
MultiByteToWideChar
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
WideCharToMultiByte
GetCPInfo
GetOEMCP
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
HeapSize
LoadLibraryA
GetCurrentProcessId
GetTimeZoneInformation
FlushFileBuffers
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetCurrentDirectoryA
GetFullPathNameA
GetDriveTypeA
Sections
.text Size: 150KB - Virtual size: 149KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 23KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
����uG Size: 16KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE