Static task
static1
Behavioral task
behavioral1
Sample
b621e42afa0ea99364a6ccdf770916d9.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b621e42afa0ea99364a6ccdf770916d9.exe
Resource
win10v2004-20240226-en
General
-
Target
b621e42afa0ea99364a6ccdf770916d9
-
Size
54KB
-
MD5
b621e42afa0ea99364a6ccdf770916d9
-
SHA1
30d01c47a900d94f9d05f4102d6c8b72133100ad
-
SHA256
5ebd3f25ffcb659974c92f1cc52477a50070e897c78aaaeec39f9f8702a23b2e
-
SHA512
68b3faa0b934c6304b1cf20f7dee20c392aefb64c17de35e0619a40cf428fac256dd785fb77ef6821428ff9b20d8776dad05dda4ba53e2598faccfca9dc94774
-
SSDEEP
1536:N3APsMtGeyrG8Nb0twRZu6yH1d11S16qhXnK2eirAoXB7si:GPsuyq/wU+6qh3K2eEh
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b621e42afa0ea99364a6ccdf770916d9
Files
-
b621e42afa0ea99364a6ccdf770916d9.exe windows:4 windows x86 arch:x86
a9a222705bc6f048fc53a9189cb302f6
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CommConfigDialogA
EnumSystemLocalesW
ExitProcess
GetNumberFormatA
GetStringTypeA
OpenSemaphoreA
QueryPerformanceFrequency
TlsSetValue
advapi32
CryptCreateHash
CryptDuplicateKey
GetAce
GetSidLengthRequired
RegQueryMultipleValuesA
RegQueryValueExW
RegSaveKeyA
ReportEventW
SetSecurityDescriptorDacl
user32
CallWindowProcA
ChangeDisplaySettingsA
CharUpperBuffA
CopyAcceleratorTableA
CreateDesktopA
GetListBoxInfo
GetMenuState
GetTitleBarInfo
IMPGetIMEA
IsWindow
LoadAcceleratorsA
SendDlgItemMessageA
WaitForInputIdle
shell32
Control_RunDLL
DragQueryFile
ExtractAssociatedIconExA
ExtractIconResInfoA
ExtractVersionResource16W
FindExecutableA
OpenAs_RunDLLW
SHBrowseForFolder
SHChangeNotify
SHFileOperationW
SHHelpShortcuts_RunDLLA
SHUpdateRecycleBinIcon
SheGetDirW
SheSetCurDrive
Sections
.text Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 51KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE