Static task
static1
Behavioral task
behavioral1
Sample
d63262f17421368340a9b148a2ae932b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d63262f17421368340a9b148a2ae932b.exe
Resource
win10v2004-20240226-en
General
-
Target
d63262f17421368340a9b148a2ae932b
-
Size
480KB
-
MD5
d63262f17421368340a9b148a2ae932b
-
SHA1
7510d956449d87dc373b5a791e79c593a0742053
-
SHA256
c26a31daed678bbda4e0d454cf696a938b085ac1208fe7f4e0f82f39ee234a4d
-
SHA512
b19825eda7c910901edc0ae70f0c09062e95b7a66526b9415b7f6ec05867d2ecd091957afe11dadf24fd33f079ed75ceb41f9fbffc19defbcb748d9588180fb5
-
SSDEEP
6144:dAIo13fR/Jf7hunFpp+GPF0pzoD6Z6ux4FJYDb4OwNzf+mNvCLlAJfBTLbgCQTlD:Y9q5CEYDbIPOlyNnHxUmDSt
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d63262f17421368340a9b148a2ae932b
Files
-
d63262f17421368340a9b148a2ae932b.exe windows:4 windows x86 arch:x86
af28eeadacedbde3e10d52235771856f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCommandLineA
DeleteCriticalSection
LCMapStringA
SetWaitableTimer
RtlUnwind
GetTimeFormatA
InterlockedExchangeAdd
GetCurrentProcess
GetOEMCP
VirtualAlloc
SetConsoleCtrlHandler
IsValidCodePage
HeapReAlloc
GetLastError
OpenFileMappingA
GetFileType
FreeLibrary
LeaveCriticalSection
GetModuleFileNameA
GetCPInfo
GetStringTypeW
ExitProcess
GetDateFormatA
GetStringTypeA
HeapCreate
LoadLibraryA
GetTickCount
GetSystemTimeAsFileTime
GetStartupInfoA
FreeEnvironmentStringsW
InitializeCriticalSectionAndSpinCount
QueryPerformanceCounter
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetPrivateProfileIntA
SetLastError
TlsGetValue
FreeEnvironmentStringsA
HeapAlloc
GetLocaleInfoW
HeapFree
GetWindowsDirectoryW
SetEnvironmentVariableA
GetCurrentProcessId
GetNamedPipeHandleStateA
GetTimeZoneInformation
GetStdHandle
TlsAlloc
HeapSize
EnumSystemLocalesA
GetEnvironmentStrings
GetUserDefaultLCID
GetACP
WriteFile
Sleep
OpenSemaphoreA
CompareStringA
GetModuleHandleA
ReadConsoleW
WideCharToMultiByte
SetThreadAffinityMask
CreateMutexA
SetHandleCount
MultiByteToWideChar
GetPrivateProfileStructW
EnterCriticalSection
HeapDestroy
GetProcAddress
GetEnvironmentStringsW
GetLocaleInfoA
CompareStringW
IsValidLocale
InterlockedExchange
InterlockedDecrement
VirtualFree
GetModuleHandleW
VirtualQuery
TlsSetValue
TlsFree
lstrcmpiA
LCMapStringW
GetCurrentThreadId
InterlockedIncrement
GetEnvironmentVariableA
TerminateProcess
GetCurrentThread
IsDebuggerPresent
user32
OemToCharBuffW
SetForegroundWindow
EnumChildWindows
DlgDirSelectExA
GetWindowLongA
CharUpperBuffA
DrawStateW
DlgDirSelectComboBoxExA
VkKeyScanW
wsprintfA
GetKeyboardLayout
MapVirtualKeyExW
GetClassInfoExW
CharToOemBuffA
GetCursorInfo
PeekMessageW
DdeKeepStringHandle
CharLowerA
RegisterClipboardFormatA
SetKeyboardState
wininet
UnlockUrlCacheEntryFileA
InternetWriteFile
SetUrlCacheEntryGroup
InternetReadFile
InternetSetCookieW
FindFirstUrlCacheEntryExA
CreateUrlCacheContainerA
InternetGetCertByURL
InternetFindNextFileW
FtpDeleteFileW
FtpPutFileW
HttpCheckDavCompliance
FtpSetCurrentDirectoryA
HttpEndRequestW
HttpSendRequestExA
InternetOpenW
InternetErrorDlg
ShowX509EncodedCertificate
UnlockUrlCacheEntryStream
FindNextUrlCacheEntryW
CommitUrlCacheEntryA
Sections
.text Size: 156KB - Virtual size: 156KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 313KB - Virtual size: 312KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ