c:\w
Static task
static1
Behavioral task
behavioral1
Sample
d631ed37c537d1c735893d52e2bddccc.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d631ed37c537d1c735893d52e2bddccc.exe
Resource
win10v2004-20240226-en
General
-
Target
d631ed37c537d1c735893d52e2bddccc
-
Size
789KB
-
MD5
d631ed37c537d1c735893d52e2bddccc
-
SHA1
2585b23eb6f6d668479935605b973b4e57b082af
-
SHA256
13a7b355924072b4a391fd1571833b8c52b50c8015e11af99240aa5365bf2b99
-
SHA512
4ee1251089c36ade0fa80c95d79a9428fe244be0ba6c02f02018c087b85941cb76357ed40e91b02735f384cc6330a513eade0c61764790ab9657def02650b331
-
SSDEEP
24576:u0rHPIugTRwtz92XHhH7zEcyDw6RgNn19AtUNr:uS9rtzcXEcyD7Gxfr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d631ed37c537d1c735893d52e2bddccc
Files
-
d631ed37c537d1c735893d52e2bddccc.exe windows:4 windows x86 arch:x86
29cfc671fe824e663642f00247292782
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GlobalAddAtomW
GetSystemTimeAsFileTime
MultiByteToWideChar
FindFirstFileExW
GetStartupInfoA
OpenMutexA
CompareStringA
RtlUnwind
LCMapStringA
CompareStringW
FindAtomA
CloseHandle
HeapDestroy
ReadFile
HeapAlloc
TlsFree
GetVersion
TlsGetValue
FreeEnvironmentStringsA
VirtualQuery
FlushFileBuffers
TlsSetValue
WriteProfileStringW
FreeResource
GetModuleFileNameA
GetLastError
HeapReAlloc
SetStdHandle
GetOEMCP
ReleaseMutex
LCMapStringW
LocalReAlloc
ReadConsoleA
LeaveCriticalSection
InterlockedDecrement
SetHandleCount
GetStdHandle
RemoveDirectoryW
AddAtomA
WriteFile
InterlockedExchange
SetLastError
InitializeCriticalSection
GetCPInfo
GetAtomNameA
GetACP
GetCommandLineA
GetCurrentThreadId
CommConfigDialogA
GetStringTypeA
SetFilePointer
ExitProcess
VirtualFree
ExpandEnvironmentStringsA
DeleteCriticalSection
GetCurrentThread
LoadLibraryA
GetModuleHandleA
WideCharToMultiByte
SetEnvironmentVariableA
GetTimeZoneInformation
GetLocalTime
GetConsoleTitleA
CreateMutexA
GetProcAddress
EnterCriticalSection
UnhandledExceptionFilter
GetStringTypeW
GetEnvironmentStringsW
HeapFree
InterlockedIncrement
TlsAlloc
GetCurrentProcess
IsBadWritePtr
QueryPerformanceCounter
HeapCreate
VirtualAlloc
GetCurrentProcessId
GetSystemTime
SetPriorityClass
GetFileType
GetEnvironmentStrings
GetLocaleInfoW
GetTickCount
FreeEnvironmentStringsW
TerminateProcess
comctl32
ImageList_SetFilter
CreateStatusWindowW
ImageList_SetImageCount
DrawInsert
InitCommonControlsEx
ImageList_Merge
ImageList_BeginDrag
ImageList_DragLeave
ImageList_GetDragImage
ImageList_GetImageRect
ImageList_SetIconSize
ImageList_GetImageCount
ImageList_Duplicate
ImageList_DragEnter
ImageList_GetImageInfo
DrawStatusText
ImageList_Create
ImageList_Remove
DrawStatusTextW
ImageList_AddIcon
ImageList_GetBkColor
ImageList_GetIcon
ImageList_DrawEx
user32
CallWindowProcW
GetWindowTextLengthA
PeekMessageA
GetClipboardFormatNameA
MessageBoxA
DestroyWindow
PostThreadMessageW
PostMessageA
GetWindowThreadProcessId
CreateWindowExW
RegisterClassExA
DdeReconnect
ShowWindow
SetTimer
DefWindowProcA
CreateDialogParamW
TranslateAccelerator
RegisterClassA
CascadeWindows
SetUserObjectInformationW
IsDialogMessageW
Sections
.text Size: 581KB - Virtual size: 581KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 43KB - Virtual size: 62KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 109KB - Virtual size: 108KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 54KB - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ