Static task
static1
Behavioral task
behavioral1
Sample
d4b91c189555384401e904e6c957dac4.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
d4b91c189555384401e904e6c957dac4.exe
Resource
win10v2004-20240226-en
General
-
Target
d4b91c189555384401e904e6c957dac4
-
Size
1.0MB
-
MD5
d4b91c189555384401e904e6c957dac4
-
SHA1
5dde91075d3ebd7a936c7e00bc8d0926a612057f
-
SHA256
65cc4896178883635043ace740641d91a7d5afe1e54c8dbd993417895ec9da6f
-
SHA512
471061eb4a335c51157889a9bbc61d01607d140a680d1e1d4903c42a400e9aeb8b3eaa0b94e2736dfa7d110239ec206e9807b6d1fe184a867f530a883b207aeb
-
SSDEEP
24576:mbbyxynbcAJnJ0vbBV3dsaM5b+szZTTYsi96cXLI:n+L0flM5b9BuLI
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d4b91c189555384401e904e6c957dac4
Files
-
d4b91c189555384401e904e6c957dac4.exe windows:4 windows x86 arch:x86
5f2df7257758bf2707e2911007001ebd
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ResetEvent
CreateThread
LoadLibraryA
FindResourceA
GetModuleHandleA
LocalAlloc
LocalFree
GetCommandLineW
GlobalAlloc
GlobalFree
SetEvent
CreateProcessA
ExitProcess
GetTickCount
user32
GetClientRect
GetWindowRect
BeginDeferWindowPos
DeferWindowPos
EndDeferWindowPos
ShowWindow
UpdateWindow
CreateWindowExA
LoadBitmapA
SendMessageA
DestroyWindow
Sections
.text Size: 164KB - Virtual size: 612KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.dyamarC Size: 356KB - Virtual size: 628KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.dyamarD Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 84KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ