Static task
static1
Behavioral task
behavioral1
Sample
6478561c4505ce7c0b1c36374cae14845239581114967894c9a6feec0f01f5ff.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6478561c4505ce7c0b1c36374cae14845239581114967894c9a6feec0f01f5ff.exe
Resource
win10v2004-20240426-en
General
-
Target
6478561c4505ce7c0b1c36374cae14845239581114967894c9a6feec0f01f5ff
-
Size
204KB
-
MD5
a17bc283fa2cfa2eb9c0a60d5bec5b32
-
SHA1
c79e5eaf761d2761e36115d76e14995c7554c76c
-
SHA256
6478561c4505ce7c0b1c36374cae14845239581114967894c9a6feec0f01f5ff
-
SHA512
24ee9eb8cffcb8468788a22a009db256454d45d887c54a914fef8966c3f5bf177a1d667b162b4736ec14ac70624ac050413f27a4691c9c2f7522409335ee864f
-
SSDEEP
3072:SdGaTPrrIGvvyy8dHSi+OcGMrOpOVKdOyMbkrWRdg+E2uEPczTinJhV+p9GEVFU/:gGazIc6TVBMrOpzeJEsuirSGEMpgE
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6478561c4505ce7c0b1c36374cae14845239581114967894c9a6feec0f01f5ff
Files
-
6478561c4505ce7c0b1c36374cae14845239581114967894c9a6feec0f01f5ff.exe windows:4 windows x86 arch:x86
e12f72e7fe59535708698b4de0340a02
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetOEMCP
GetWindowsDirectoryW
SetErrorMode
CreateFileMappingA
GetComputerNameA
QueryPerformanceCounter
GetModuleFileNameA
SetPriorityClass
lstrcpyn
GetFileType
InitializeCriticalSection
GetLogicalDrives
GetProcessHeap
GetNumberFormatA
LocalAlloc
CreateEventW
GetTimeFormatA
GetVersionExW
GetProcessHeaps
CopyFileExW
GetHandleInformation
GlobalGetAtomNameA
FlushFileBuffers
CreateNamedPipeW
CopyFileA
GetCurrentDirectoryA
OpenWaitableTimerW
GetCommandLineW
lstrlen
CopyFileExA
FreeLibrary
SetComputerNameW
GetProcAddress
EnumCalendarInfoA
FindAtomA
GetModuleHandleW
CreatePipe
OpenProcess
CreateMailslotW
BeginUpdateResourceW
IsDebuggerPresent
GetVersionExA
GetEnvironmentStringsW
GetModuleHandleA
user32
GetSysColorBrush
RegisterClassExW
GetWindowLongA
SetMenu
ArrangeIconicWindows
DialogBoxParamW
LoadIconW
CreateIcon
CharNextA
GetMessageW
LoadImageA
TrackPopupMenuEx
mouse_event
GetParent
OpenClipboard
LoadIconW
GetIconInfo
CheckRadioButton
GetIconInfo
GetWindowTextW
OffsetRect
SetWindowPos
GetMenuStringW
CopyRect
EnumWindows
SetFocus
SetDlgItemInt
GetSystemMetrics
GetWindowTextLengthA
GetCapture
GetMenuItemCount
EnumDesktopsA
DestroyCursor
GetClassInfoExA
UpdateLayeredWindow
MonitorFromWindow
FrameRect
EnumChildWindows
FindWindowA
LoadBitmapW
RegisterClassExA
CloseWindow
IsMenu
MessageBeep
AdjustWindowRect
EnumDesktopWindows
DeleteMenu
MonitorFromRect
IsWindow
gdi32
ExtFloodFill
ExtEscape
EqualRgn
CopyEnhMetaFileW
SetPixelFormat
ResetDCW
CreatePolygonRgn
CreateDCA
SetTextJustification
GetKerningPairsA
GetDCPenColor
SetPaletteEntries
AbortPath
CreatePolyPolygonRgn
GetBkMode
advapi32
RegOpenKeyA
RegQueryValueW
RegReplaceKeyW
RegCreateKeyExW
RegRestoreKeyA
oleaut32
CreateDispTypeInfo
opengl32
glColor3iv
winspool.drv
SetPortW
AddPortExW
ScheduleJob
PrinterProperties
XcvDataW
FindNextPrinterChangeNotification
EnumPrintProcessorDatatypesW
SetPortA
ResetPrinterW
oledlg
OleUIInsertObjectA
wsock32
WSARecvEx
WSASetBlockingHook
shutdown
Sections
.text Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.oqngCF Size: 1KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.N Size: 4KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.LUV Size: 1024B - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.GOTYM Size: 2KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.AGbvFQ Size: 2KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.kkPQAu Size: 512B - Virtual size: 253KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 168KB - Virtual size: 168KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ