Static task
static1
Behavioral task
behavioral1
Sample
342a08c1e2c325f96fcc2361f66c4f8e00e35e6613143bda7aab679ce52d6dd0.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
342a08c1e2c325f96fcc2361f66c4f8e00e35e6613143bda7aab679ce52d6dd0.exe
Resource
win10v2004-20240412-en
General
-
Target
342a08c1e2c325f96fcc2361f66c4f8e00e35e6613143bda7aab679ce52d6dd0
-
Size
384KB
-
MD5
88716ed91614ba43691f1204a8e1936c
-
SHA1
d8b3411ae843a5f1d4b506eccec26077fd2f29f2
-
SHA256
342a08c1e2c325f96fcc2361f66c4f8e00e35e6613143bda7aab679ce52d6dd0
-
SHA512
e64af6563e672408ebefc089a02dc6c99082c7a1d4b0a67258c50da88add8bf8c58045041968e22d1a9924f95d62cf2245ed253ac41473c1d28c8d8c62f88bad
-
SSDEEP
6144:zBeJdbHCHcRlJUdarnrIM+PbeEnvutw2cVMuXrvEnODd0cpMLnJV6Xlxq+:zBCdG4l2rM+PFgYM+rcOd0l/elxz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 342a08c1e2c325f96fcc2361f66c4f8e00e35e6613143bda7aab679ce52d6dd0
Files
-
342a08c1e2c325f96fcc2361f66c4f8e00e35e6613143bda7aab679ce52d6dd0.exe windows:4 windows x86 arch:x86
cf521ed76c55242e79581067f04305d2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mpr
WNetDisconnectDialog
WNetAddConnectionA
WNetConnectionDialog1A
WNetConnectionDialog
WNetDisconnectDialog1A
gdi32
GetCharWidthA
GetGlyphOutlineW
CreateFontA
DeleteDC
EndPage
SetBkColor
GetTextCharsetInfo
CreateSolidBrush
Arc
CreateFontIndirectW
SetRectRgn
GetSystemPaletteEntries
SetWinMetaFileBits
SetROP2
CopyEnhMetaFileA
SetWorldTransform
GetEnhMetaFilePaletteEntries
CreateBitmap
Polyline
StretchBlt
GetROP2
Ellipse
Rectangle
GetObjectType
SelectPalette
PatBlt
DeleteObject
SetAbortProc
SetPixelV
GetNearestPaletteIndex
GetFontData
CreateDIBPatternBrushPt
SetColorAdjustment
DPtoLP
GetMapMode
StartPage
GetBrushOrgEx
LPtoDP
GetCharABCWidthsW
EnumFontsW
SetStretchBltMode
StartDocW
TextOutA
CopyEnhMetaFileW
GetObjectA
SetBkMode
CreatePen
IntersectClipRect
SaveDC
PolyBezierTo
CreateRoundRectRgn
OffsetViewportOrgEx
SetTextAlign
UpdateColors
CreateFontIndirectA
EqualRgn
ExtFloodFill
GetWinMetaFileBits
GetTextColor
GetDIBColorTable
DeleteEnhMetaFile
ResizePalette
StartDocA
CreateDIBSection
GdiFlush
EndDoc
PtVisible
ExtTextOutA
SwapBuffers
EnumMetaFile
PlayEnhMetaFile
GetTextExtentPointA
ExtCreateRegion
GetTextExtentPoint32W
CreateCompatibleDC
PlayEnhMetaFileRecord
GetBkColor
RectVisible
CreateDCW
OffsetRgn
GetObjectW
GetTextExtentPoint32A
RestoreDC
GetDeviceCaps
GetTextAlign
CombineRgn
netapi32
NetServerEnum
oleaut32
LPSAFEARRAY_UserFree
user32
CreateIconFromResourceEx
SendMessageA
DdeConnectList
msvcrt
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
__p__commode
_snwscanf
wscanf
_onexit
__dllonexit
_rmdir
__p__fmode
_beep
__set_app_type
_except_handler3
_eof
_controlfp
advapi32
GetTrusteeTypeA
GetTrusteeFormA
BuildExplicitAccessWithNameA
BuildImpersonateTrusteeA
SetServiceStatus
mfc42
ord1008
ord4080
ord3079
ord3825
ord3831
ord3830
ord1047
ord2976
ord3081
ord2985
ord4424
ord1063
ord4465
ord3259
ord1037
ord2982
ord1080
ord5714
ord1074
ord5307
ord1006
ord1093
ord2725
ord561
ord3738
ord3262
ord1576
ord1168
ord815
ord6375
ord4486
ord1012
ord1043
ord5731
ord3922
ord1089
ord1024
ord2396
ord1043
ord1050
ord5302
Sections
.text Size: 88KB - Virtual size: 85KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 40KB - Virtual size: 2.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 48KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.htext Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE