Static task
static1
Behavioral task
behavioral1
Sample
d53adf4d07f51fd29aec9594a7c6d99f.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d53adf4d07f51fd29aec9594a7c6d99f.exe
Resource
win10v2004-20240226-en
General
-
Target
d53adf4d07f51fd29aec9594a7c6d99f
-
Size
497KB
-
MD5
d53adf4d07f51fd29aec9594a7c6d99f
-
SHA1
f9e4b7b9b5c8eb7a73921fd1ecbe89275d52bca6
-
SHA256
ef21ff823e7ce4eb58e8b11ceee92f0bda290b42c5a009bdad8fbb7d836fd6c5
-
SHA512
fd567ee54b1ee7ebbe3aefe209ee61b93d9c65d00f8bceee828e374989085e6c21ecb0c94237058a53edadb8e747a2fd136665309a2c10cb989bf79ab66f14c5
-
SSDEEP
12288:Pf8NQREUIA0v/hXnUHB6t1s+ny1XtE/mSp8DzFK9KA4bxOjQtrMWeIXCA20OsMAT:H8NND/hvs6dR4bHtr/e8nhzeHO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d53adf4d07f51fd29aec9594a7c6d99f
Files
-
d53adf4d07f51fd29aec9594a7c6d99f.exe windows:4 windows x86 arch:x86
ccf5810b2122c55a13db79dcff9036f5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
ExtractAssociatedIconA
ShellExecuteA
ExtractAssociatedIconW
SHEmptyRecycleBinA
comdlg32
ChooseFontA
GetOpenFileNameA
PageSetupDlgW
GetSaveFileNameW
user32
IsDialogMessageA
ChangeDisplaySettingsExA
RegisterClassExA
GetDlgItemTextW
GetWindowTextA
CreateWindowStationW
RegisterClassA
IsWindowUnicode
VkKeyScanExA
GetUserObjectInformationW
SetRectEmpty
DrawCaption
CloseClipboard
DrawStateA
FindWindowExW
LockWindowUpdate
CheckMenuItem
OpenClipboard
GetWindowPlacement
kernel32
CreateFileMappingW
InterlockedIncrement
EnterCriticalSection
LCMapStringA
GetCurrentProcess
IsBadWritePtr
GetProcAddress
ReadConsoleA
GetCurrentProcessId
GetSystemTime
CloseHandle
GetEnvironmentStringsW
GetModuleFileNameA
GetCurrentThreadId
LCMapStringW
HeapReAlloc
GetCurrentThread
TlsGetValue
SetLastError
WriteFile
LoadLibraryA
GetCPInfo
GetStartupInfoA
ReadFile
QueryPerformanceCounter
GetVolumeInformationA
TerminateProcess
GetEnvironmentStrings
LeaveCriticalSection
HeapDestroy
VirtualFree
GetTickCount
UnhandledExceptionFilter
GetCurrencyFormatA
GetLocalTime
ReadConsoleOutputCharacterW
GetAtomNameA
InterlockedExchange
ResumeThread
FreeEnvironmentStringsW
SetConsoleActiveScreenBuffer
GetStringTypeW
SetEnvironmentVariableA
GetStdHandle
WaitNamedPipeA
SetStdHandle
GetCommandLineA
HeapAlloc
GetSystemTimeAsFileTime
lstrcpyA
SetHandleCount
FreeEnvironmentStringsA
TlsSetValue
WriteFileEx
WideCharToMultiByte
HeapFree
FlushFileBuffers
GetOEMCP
lstrlen
CompareStringA
MultiByteToWideChar
GetModuleHandleA
DeleteCriticalSection
GetStringTypeA
CreateMutexA
TlsAlloc
LocalFileTimeToFileTime
InitializeCriticalSection
VirtualQuery
RtlUnwind
GetVersion
GetACP
GetWindowsDirectoryW
InterlockedDecrement
GetTimeZoneInformation
VirtualAlloc
GetFileType
HeapCreate
TlsFree
GetLastError
CompareStringW
OpenMutexA
SetFilePointer
OutputDebugStringW
ExitProcess
wininet
FtpGetFileEx
RetrieveUrlCacheEntryStreamW
FtpPutFileEx
GopherOpenFileW
comctl32
InitCommonControlsEx
Sections
.text Size: 173KB - Virtual size: 173KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 313KB - Virtual size: 313KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ