Static task
static1
Behavioral task
behavioral1
Sample
c5184a30a88c234d3031c7661e0383114b54078448d62ae6fb51a4455863d4b5_packed.bin.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c5184a30a88c234d3031c7661e0383114b54078448d62ae6fb51a4455863d4b5_packed.bin.exe
Resource
win10v2004-20240226-en
General
-
Target
c5184a30a88c234d3031c7661e0383114b54078448d62ae6fb51a4455863d4b5_packed.bin.#@#_bce202c021feb61783563e21fc026767_NOYARA
-
Size
98KB
-
MD5
bce202c021feb61783563e21fc026767
-
SHA1
1ff52bed5f0fae0f3d0dda272f4acd124222a425
-
SHA256
c5184a30a88c234d3031c7661e0383114b54078448d62ae6fb51a4455863d4b5
-
SHA512
605f561a712c4d12affb6a58675b4474cc787cfd4d08ca3533d34af840313fa3bb690fbefb01a076df1d366a5cd3b5e16d2146d549f0475df0c559729ca30c76
-
SSDEEP
1536:RlJC8E1uJk9yBMBJ9i6e7Ww+ww+HHy/obMjmrI7csvxRPE:RnCRyBMzEWw+6zIjmO5I
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c5184a30a88c234d3031c7661e0383114b54078448d62ae6fb51a4455863d4b5_packed.bin.#@#_bce202c021feb61783563e21fc026767_NOYARA
Files
-
c5184a30a88c234d3031c7661e0383114b54078448d62ae6fb51a4455863d4b5_packed.bin.#@#_bce202c021feb61783563e21fc026767_NOYARA.exe windows:5 windows x86 arch:x86
92b1089f3f5dc8addb7d76ae0a2902f6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
CreateWindowExW
LoadStringW
CharNextW
InsertMenuW
RegisterClipboardFormatW
OemToCharBuffA
CharToOemA
DestroyMenu
SetMenuDefaultItem
GetParent
GetWindowLongW
SetWindowLongW
PostMessageW
EnableWindow
GetDlgItem
SendMessageW
GetWindowTextW
GetWindowTextLengthW
SetWindowTextW
IsDlgButtonChecked
SetFocus
SetDlgItemTextW
DispatchMessageW
TranslateMessage
CharToOemBuffA
PeekMessageA
DispatchMessageA
CharLowerA
CharUpperA
CharNextA
CharPrevA
CharUpperBuffA
GetDesktopWindow
DialogBoxParamW
LoadMenuW
GetSubMenu
RemoveMenu
GetForegroundWindow
TrackPopupMenu
DestroyWindow
RegisterClassW
DefWindowProcW
GetAsyncKeyState
GetWindowRect
DestroyIcon
SetForegroundWindow
GetDlgItemTextW
SendDlgItemMessageW
PeekMessageW
EndDialog
DeleteMenu
ShowCursor
SetCursor
LoadCursorW
CheckDlgButton
GetWindowDC
GetWindowPlacement
gdi32
GetStockObject
kernel32
VirtualQuery
GetSystemInfo
VirtualProtect
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
MultiByteToWideChar
LCMapStringA
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
Sleep
GetOEMCP
GetACP
GetCPInfo
LoadLibraryExA
RtlUnwind
InitializeCriticalSection
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetCurrentThreadId
InterlockedDecrement
SetLastError
InterlockedIncrement
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetModuleHandleW
GetFileType
SetHandleCount
WideCharToMultiByte
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetModuleFileNameA
GetStdHandle
WriteFile
ExitProcess
DeleteCriticalSection
GetEnvironmentStringsW
GetComputerNameExW
LocalAlloc
GetNumaNodeProcessorMask
GetLastError
HeapReAlloc
HeapAlloc
GetCommandLineA
GetVersionExA
GetStartupInfoA
LeaveCriticalSection
EnterCriticalSection
HeapDestroy
HeapCreate
VirtualFree
HeapFree
VirtualAlloc
OutputDebugStringA
SetUnhandledExceptionFilter
GetProcAddress
GetModuleHandleA
Sections
.text Size: 35KB - Virtual size: 34KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 49KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ