Static task
static1
Behavioral task
behavioral1
Sample
da2e1c1436cb612602bf6486d7275deadf5ac7fba578c6184897a3a3cfe163be.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
da2e1c1436cb612602bf6486d7275deadf5ac7fba578c6184897a3a3cfe163be.exe
Resource
win10v2004-20240226-en
General
-
Target
da2e1c1436cb612602bf6486d7275deadf5ac7fba578c6184897a3a3cfe163be
-
Size
73KB
-
MD5
820a7ea9d596f5f739ced82f4e00524c
-
SHA1
e44d5bad49738943625694ee697832fb54e26e28
-
SHA256
da2e1c1436cb612602bf6486d7275deadf5ac7fba578c6184897a3a3cfe163be
-
SHA512
a7ffe07eb51fe67bfdaf23a39c7bdde21590f056876bbb962a6e376ce00b99df93d9ef88d72a0be4d1368045a668c7800628eb84e6ab9771f819ad2a96766891
-
SSDEEP
1536:WXeAZLLL1GXAQ5kCo7WQldwDQfqbs28Bbqfs7qvT6YoBG/yXE:WyQBPpCJ8FYvmBG/y0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource da2e1c1436cb612602bf6486d7275deadf5ac7fba578c6184897a3a3cfe163be
Files
-
da2e1c1436cb612602bf6486d7275deadf5ac7fba578c6184897a3a3cfe163be.exe windows:5 windows x86 arch:x86
54137f14c187910cf2ba4c0fc289ef1e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
SHGetFolderPathA
shlwapi
StrStrA
StrChrA
StrStrIA
kernel32
lstrcpyA
lstrlenA
lstrcmpA
AllocConsole
GetStdHandle
WriteFile
WriteConsoleA
ReadFile
ReadConsoleA
MultiByteToWideChar
HeapFree
lstrcmpiA
WideCharToMultiByte
HeapAlloc
SetConsoleMode
GetConsoleMode
GetLastError
GetModuleFileNameA
ExitProcess
Sleep
CreateThread
GetTimeFormatA
CloseHandle
SizeofResource
LockResource
LoadResource
FindResourceA
SetFilePointer
CreateFileA
CreateDirectoryA
GetFileAttributesA
GetSystemDefaultLCID
GetModuleHandleA
ReadConsoleInputA
lstrcatA
WaitForSingleObject
SetConsoleCursorPosition
FillConsoleOutputCharacterA
GetConsoleScreenBufferInfo
PeekNamedPipe
lstrlenW
CreateProcessA
DuplicateHandle
GetCurrentProcess
CreatePipe
GetVersion
GetExitCodeProcess
TerminateProcess
GetTickCount
SetCurrentDirectoryA
DeleteFileA
ExpandEnvironmentStringsA
GetTempPathA
lstrcmpW
GetCommandLineA
GetFileSize
GetProcessHeap
RemoveDirectoryA
lstrcatW
GetCurrentDirectoryA
user32
CopyRect
GetParent
DialogBoxParamA
CharLowerA
GetWindowRect
GetDesktopWindow
CharToOemA
OffsetRect
SetWindowPos
LoadStringA
SetDlgItemTextA
GetDlgItem
SetFocus
GetDlgItemTextA
EndDialog
wsprintfA
GetForegroundWindow
MessageBoxA
IsCharAlphaNumericA
advapi32
RegCloseKey
RegEnumKeyExA
RegOpenKeyExA
RegQueryValueExW
RegQueryValueExA
ole32
CoUninitialize
CoGetObject
CLSIDFromProgID
CoCreateInstance
CoInitialize
oleaut32
VariantTimeToSystemTime
VarBstrFromCy
VarBstrFromR4
VarBstrFromR8
VarBstrFromDec
SafeArrayUnaccessData
LoadTypeLi
SysFreeString
VariantInit
SysAllocString
DispInvoke
DispGetIDsOfNames
SafeArrayAccessData
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayGetDim
SysStringLen
Sections
.text Size: 63KB - Virtual size: 63KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ