Static task
static1
Behavioral task
behavioral1
Sample
d3a7496a223a3a05ee1121488a968f32.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d3a7496a223a3a05ee1121488a968f32.exe
Resource
win10v2004-20240226-en
General
-
Target
d3a7496a223a3a05ee1121488a968f32
-
Size
863KB
-
MD5
d3a7496a223a3a05ee1121488a968f32
-
SHA1
886b5dfbd89b052fd61149a3ab797f7d2e911a82
-
SHA256
d9a93fa66dbe0101f065c248ada1d13256c9ab69ae3b26f271590665a4f62777
-
SHA512
d60e1fb6c2d818680bbd57415c4e097adf17884610d5f0ceffb7aaf90249d99d281913fac5d5807ed2796a6a0fa289aebd3850610e201353d1ee7ff5611860b0
-
SSDEEP
12288:bnmYt47Hw66m49cYT5SxtZO0J0e3CvZf749sbCPEk9JuepY+b7InGQg9eIz3mqCV:bmG40Zcg5SQ0JOv1FbCRt3+uz3HCcRX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d3a7496a223a3a05ee1121488a968f32
Files
-
d3a7496a223a3a05ee1121488a968f32.exe windows:4 windows x86 arch:x86
e4b5dd33f69724b0b1100cbe0a9e39f3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
UrlGetLocationA
ColorHLSToRGB
StrRChrIA
SHIsLowMemoryMachine
HashData
StrChrIA
PathAppendA
StrCSpnA
UrlIsOpaqueA
PathIsUNCA
PathMakePrettyA
SHCreateStreamWrapper
SHRegOpenUSKeyA
StrSpnA
PathCommonPrefixA
StrFormatByteSize64A
StrToIntExA
PathFileExistsA
PathStripToRootA
PathSearchAndQualifyA
PathGetDriveNumberA
SHRegEnumUSKeyA
SHRegCreateUSKeyA
SHAutoComplete
PathIsFileSpecA
PathRemoveBlanksA
SHRegWriteUSValueA
PathIsRelativeA
PathFindOnPathA
AssocQueryStringA
kernel32
GetLocalTime
CreateFiber
GetProfileIntA
ContinueDebugEvent
ReadConsoleA
SetMailslotInfo
GetUserDefaultLangID
QueueUserAPC
SetVolumeLabelA
MoveFileA
HeapCompact
FreeConsole
HeapUnlock
ResumeThread
WinExec
GlobalReAlloc
GetVersionExA
LocalLock
GetConsoleCursorInfo
GetCPInfoExA
Module32First
PeekNamedPipe
WriteProfileStringA
GetProfileStringA
GetTapeParameters
GetTempPathA
GetProcessVersion
SetConsoleOutputCP
_lclose
GetWindowsDirectoryA
GetLogicalDriveStringsA
GlobalFindAtomA
GetTickCount
FindResourceA
lstrcmp
CompareStringA
GlobalUnWire
HeapWalk
WriteProcessMemory
InterlockedExchange
SetEnvironmentVariableA
Heap32First
GetOverlappedResult
CreateProcessA
IsBadHugeReadPtr
GetCurrentThreadId
GetPrivateProfileIntA
WriteConsoleInputA
EnumCalendarInfoA
lstrcat
LocalAlloc
OpenEventA
DeleteFileA
GetSystemTimeAdjustment
lstrcpyn
DisconnectNamedPipe
ExitProcess
ReadFileEx
SetDefaultCommConfigA
RequestDeviceWakeup
user32
GetDlgCtrlID
Sections
.axubo Size: 638KB - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.wpq Size: 6KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.jgpm Size: 19KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.zkx Size: 512B - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.cvsp Size: 6KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.spgd Size: 512B - Virtual size: 56B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rul Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.otk Size: 49KB - Virtual size: 77KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.dczmj Size: 124KB - Virtual size: 1.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 18KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ