Static task
static1
Behavioral task
behavioral1
Sample
d738d1d9f2af192df180c19631f28920.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d738d1d9f2af192df180c19631f28920.exe
Resource
win10v2004-20240226-en
General
-
Target
d738d1d9f2af192df180c19631f28920
-
Size
419KB
-
MD5
d738d1d9f2af192df180c19631f28920
-
SHA1
3e11c6b5be168e3aaa37b6ae6ae1f717b9eec0f9
-
SHA256
a6c4cd259ad99b1dab35daa3cf2370eb5e89576ec43e961179d650611bd800e5
-
SHA512
1b1966cd2beebb6e1eac964aa9bfb57c9c43739b1b3e7a7c59d9a5ceee594348682802f5a0545291c950e8f0957f142ca6b85d73734c8400e971062d85c86387
-
SSDEEP
12288:UzFlWef33dZUvwc61GcQzempX1uflmAfnLTv:uFlW033vUvN7CCFuw+LT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d738d1d9f2af192df180c19631f28920
Files
-
d738d1d9f2af192df180c19631f28920.exe windows:6 windows x86 arch:x86
56ab8a07e7a26964457449b290c304c7
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
CloseHandle
CompareStringA
CreateEventA
CreateFileA
CreateFileMappingA
CreateFileW
CreateJobObjectA
CreateThread
CreateToolhelp32Snapshot
DeleteCriticalSection
DeleteFileA
EnterCriticalSection
ExitProcess
FlushConsoleInputBuffer
GetACP
GetCPInfo
GetCommandLineA
GetCurrentProcessId
GetCurrentThreadId
GetEnvironmentStrings
GetFileAttributesA
GetFileType
GetLastError
GetLocalTime
GetLocaleInfoA
GetModuleFileNameA
GetModuleHandleA
GetOEMCP
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetStdHandle
GetStringTypeA
GetStringTypeW
GetSystemDefaultLangID
GetThreadLocale
GetTickCount
GetTimeZoneInformation
GetUserDefaultLCID
GetVersion
GetVersionExA
GetVolumePathNamesForVolumeNameA
HeapAlloc
HeapFree
InitializeCriticalSection
InterlockedDecrement
InterlockedExchange
InterlockedIncrement
IsDBCSLeadByteEx
IsDebuggerPresent
IsValidLocale
LCMapStringA
LeaveCriticalSection
LoadLibraryA
LocalAlloc
LocalFree
MapViewOfFile
MultiByteToWideChar
OpenFileMappingA
PeekConsoleInputW
Process32First
Process32Next
RaiseException
ReadFile
RtlUnwind
SetConsoleCtrlHandler
SetCurrentDirectoryA
SetEvent
SetFilePointer
SetHandleCount
SetInformationJobObject
SetLastError
SetThreadLocale
Sleep
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnmapViewOfFile
VirtualAlloc
VirtualFree
VirtualQuery
WaitForSingleObject
WideCharToMultiByte
WriteFile
lstrcatA
lstrcmpA
lstrcpyA
lstrcpynA
user32
CharNextA
EnableWindow
EnumThreadWindows
GetDesktopWindow
GetFocus
GetKBCodePage
GetPropA
GrayStringW
IsZoomed
MessageBoxA
OemToCharBuffW
RegisterDeviceNotificationW
ToUnicodeEx
wsprintfA
wininet
HttpAddRequestHeadersA
HttpEndRequestA
HttpOpenRequestA
HttpQueryInfoA
HttpSendRequestA
HttpSendRequestExA
InternetConnectA
InternetOpenA
InternetQueryDataAvailable
InternetQueryOptionA
InternetReadFile
InternetSetOptionA
InternetWriteFile
InternetCloseHandle
Sections
.text Size: 323KB - Virtual size: 324KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 59KB - Virtual size: 104KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 6KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 5KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 13KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ