Static task
static1
Behavioral task
behavioral1
Sample
04f5612c93c9fe5ad8ec44934a5f3bba3b12d908164e0940c9865afaa8ac0e9f.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
04f5612c93c9fe5ad8ec44934a5f3bba3b12d908164e0940c9865afaa8ac0e9f.exe
Resource
win10v2004-20240226-en
General
-
Target
04f5612c93c9fe5ad8ec44934a5f3bba3b12d908164e0940c9865afaa8ac0e9f
-
Size
228KB
-
MD5
03c06f23e15cad1866e48a67be1578b2
-
SHA1
241469e1d18fd8b8100e84fd3bdcab310097a5ad
-
SHA256
04f5612c93c9fe5ad8ec44934a5f3bba3b12d908164e0940c9865afaa8ac0e9f
-
SHA512
e1d01ec67a890c35d9d7570ec6e1ca388f2c0f0d2546cc584ed738b45368fc3b9eaacbf4ea341e07e09d1e96536d03cc334c99783cf48187b6fb1af2ec5e4687
-
SSDEEP
6144:WEtZV3CO1uxigC1CDJH+lin0A2mIGVrU3/4:WErwO43gif2Mr04
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 04f5612c93c9fe5ad8ec44934a5f3bba3b12d908164e0940c9865afaa8ac0e9f
Files
-
04f5612c93c9fe5ad8ec44934a5f3bba3b12d908164e0940c9865afaa8ac0e9f.exe windows:4 windows x86 arch:x86
b96a4fd7d77e26f881ec7ad68cfd0a30
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
PulseEvent
lstrcpyA
lstrlenA
VirtualFree
GetModuleHandleA
FreeResource
SizeofResource
LockResource
LoadResource
FindResourceExA
GetLastError
VirtualProtect
DeleteFileA
ReadFile
CreateFileA
HeapAlloc
GetSystemInfo
VirtualAlloc
LocalAlloc
InterlockedDecrement
GlobalFree
WriteFile
GlobalAlloc
LoadLibraryA
SystemTimeToFileTime
GetSystemTime
EndUpdateResourceA
UpdateResourceA
BeginUpdateResourceA
GetStartupInfoA
DebugBreak
HeapReAlloc
HeapFree
GetModuleFileNameA
VirtualQuery
LoadLibraryW
GetProcAddress
SetEvent
FreeLibrary
ExitProcess
GetCommandLineA
GetCurrentThreadId
lstrcmpiA
Sleep
CreateEventA
CreateThread
WaitForSingleObject
CloseHandle
HeapCreate
user32
IsWindow
GetDesktopWindow
TranslateAcceleratorA
LoadAcceleratorsA
LoadStringA
RegisterClassExA
LoadCursorA
LoadIconA
UpdateWindow
ShowWindow
CreateWindowExA
PostQuitMessage
EndPaint
DrawTextA
BeginPaint
IsWindowVisible
DialogBoxParamA
EndDialog
PeekMessageA
TranslateMessage
PostMessageA
GetDC
FillRect
ReleaseDC
GetClientRect
RegisterClassA
BringWindowToTop
DefWindowProcA
AttachThreadInput
GetMessageA
IsRectEmpty
SetRect
DestroyWindow
UnregisterClassA
DispatchMessageA
CharNextA
PostThreadMessageA
EnumDisplaySettingsA
gdi32
Rectangle
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
GetDIBits
SetROP2
GetObjectA
ole32
CoUninitialize
CoInitialize
CoCreateInstance
oleaut32
VariantClear
VariantInit
atl
ord57
ord21
ord16
ord23
ord17
ord20
ord18
pdh
PdhGetLogFileSize
PdhGetDataSourceTimeRangeW
wininet
InternetCloseHandle
InternetOpenW
Sections
.text Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 4KB - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 190KB - Virtual size: 802KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vls Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE