Static task
static1
Behavioral task
behavioral1
Sample
ddad0328b678c859c84f81e6a829a7ecc9b29e8f63828b095bb26dbb2b1da083.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ddad0328b678c859c84f81e6a829a7ecc9b29e8f63828b095bb26dbb2b1da083.exe
Resource
win10v2004-20240419-en
General
-
Target
ddad0328b678c859c84f81e6a829a7ecc9b29e8f63828b095bb26dbb2b1da083
-
Size
704KB
-
MD5
60b704f2d7a7d4b598a9135ab408f835
-
SHA1
45275ba31d695aae7a467e541a1ca0e1ea845547
-
SHA256
ddad0328b678c859c84f81e6a829a7ecc9b29e8f63828b095bb26dbb2b1da083
-
SHA512
5a6815b498256b2dca61ace96440433010a08f81992c0394c9848502e56d76f307ad46df9321b4e657ecf4863df6d6ac983ee72039cc995369a5c91fe6571221
-
SSDEEP
12288:SADMZDllWkKsoIno64QJoF+vNPKSgiE8L9L9EJTcYni:xQZDHWxso6o64eoF0iSd59L9IQY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ddad0328b678c859c84f81e6a829a7ecc9b29e8f63828b095bb26dbb2b1da083
Files
-
ddad0328b678c859c84f81e6a829a7ecc9b29e8f63828b095bb26dbb2b1da083.exe windows:4 windows x86 arch:x86
0184fbac2438306f556d751946a24411
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
TerminateProcess
OpenProcess
GetCurrentThreadId
MultiByteToWideChar
WideCharToMultiByte
lstrlenW
GetLastError
InterlockedIncrement
InterlockedDecrement
lstrlenA
lstrcmpiA
IsDBCSLeadByte
FreeLibrary
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
GetModuleHandleA
GetModuleFileNameA
GetExitCodeProcess
DeleteFileA
Sleep
CreateEventA
OpenEventA
CloseHandle
OutputDebugStringA
CreateDirectoryA
SetFileAttributesA
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
RaiseException
SetEndOfFile
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
CreateProcessA
GetLocalTime
LoadLibraryA
FlushFileBuffers
GetSystemTimeAsFileTime
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlUnwind
HeapFree
HeapAlloc
VirtualProtect
VirtualAlloc
GetProcAddress
GetSystemInfo
VirtualQuery
HeapReAlloc
ReadFile
WriteFile
GetConsoleCP
GetConsoleMode
SetFilePointer
GetCommandLineA
GetProcessHeap
GetStartupInfoA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
SetHandleCount
GetStdHandle
GetFileType
HeapSize
ExitProcess
GetCPInfo
GetOEMCP
IsValidCodePage
SetStdHandle
CreateFileA
HeapDestroy
HeapCreate
VirtualFree
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
user32
CharNextA
DestroyWindow
MessageBoxA
UnregisterClassA
DefWindowProcA
advapi32
RegOpenKeyExA
RegEnumKeyExA
RegQueryInfoKeyA
RegSetValueExA
RegDeleteKeyA
RegCreateKeyExA
RegCloseKey
RegDeleteValueA
ole32
CoTaskMemRealloc
CoCreateInstance
CoUninitialize
CoInitialize
CoTaskMemFree
CoTaskMemAlloc
oleaut32
VarUI4FromStr
comctl32
InitCommonControlsEx
psapi
GetModuleBaseNameA
EnumProcessModules
EnumProcesses
Sections
.text Size: 92KB - Virtual size: 90KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 580KB - Virtual size: 584KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE