Static task
static1
Behavioral task
behavioral1
Sample
d04fbeb62b0afc6816cbd163b0636fefafff17c20d490a39960d6924465c79e8.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
d04fbeb62b0afc6816cbd163b0636fefafff17c20d490a39960d6924465c79e8.exe
Resource
win11-20240426-en
General
-
Target
d04fbeb62b0afc6816cbd163b0636fefafff17c20d490a39960d6924465c79e8
-
Size
373KB
-
MD5
f385365928f6da5ddd1507e23002e663
-
SHA1
1f107fc612da217ff87dc77afa2d8927bc082ba5
-
SHA256
d04fbeb62b0afc6816cbd163b0636fefafff17c20d490a39960d6924465c79e8
-
SHA512
4da23cd4fd996728148642feaf13558d4bece95326cf7dc1fe5a438a59b61d8a9ce166e1887f2c629c0b16e7de584156c7293267645ad384c756126518a62257
-
SSDEEP
6144:f3zKRiuj4iagk73Xub/LrL5td+5wX/i4UT7IQg28IAT:rKRiujmgc3uv5T+KX/ivoz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d04fbeb62b0afc6816cbd163b0636fefafff17c20d490a39960d6924465c79e8
Files
-
d04fbeb62b0afc6816cbd163b0636fefafff17c20d490a39960d6924465c79e8.exe windows:5 windows x86 arch:x86
afeb64683ef366ef06ee02a86dd880f8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleFileNameW
lstrcatA
QueryInformationJobObject
GetACP
IsBadStringPtrA
GetLastError
SetLastError
GetProcAddress
SetComputerNameA
LoadLibraryA
LocalAlloc
FindFirstVolumeMountPointW
OpenEventA
GetDiskFreeSpaceA
FoldStringA
GetCalendarInfoA
BuildCommDCBA
VirtualProtect
GetWindowsDirectoryW
AddConsoleAliasA
WriteProcessMemory
SetFileAttributesW
CreateFileW
CloseHandle
WriteConsoleW
OutputDebugStringW
GetConsoleCP
FlushFileBuffers
SetStdHandle
GetConsoleMode
TzSpecificLocalTimeToSystemTime
GetUserDefaultLangID
GetTickCount
GetNumberFormatA
InterlockedCompareExchange
CreateDirectoryW
SetConsoleTextAttribute
LoadLibraryExW
GetDefaultCommConfigA
GetSystemDefaultLangID
GetOEMCP
IsValidCodePage
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
WideCharToMultiByte
MultiByteToWideChar
GetStringTypeW
EncodePointer
DecodePointer
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
HeapFree
HeapReAlloc
GetCommandLineW
GetCPInfo
RaiseException
RtlUnwind
HeapAlloc
IsProcessorFeaturePresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
Sleep
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
LCMapStringW
GetProcessHeap
ExitProcess
GetModuleHandleExW
HeapSize
IsDebuggerPresent
GetStdHandle
GetFileType
GetCurrentThreadId
ReadFile
SetFilePointerEx
WriteFile
user32
DrawCaption
CloseWindow
DdeQueryStringA
DdeCmpStringHandles
LoadMenuW
GetWindowTextLengthA
GetUserObjectSecurity
GetKeyNameTextA
gdi32
GetCharacterPlacementW
DeleteMetaFile
GdiComment
GetPixelFormat
advapi32
ReadEventLogA
ReadEventLogW
RegOpenKeyW
RegisterEventSourceW
CloseEventLog
ole32
CoGetClassObject
CoMarshalHresult
CoRegisterPSClsid
winhttp
WinHttpCheckPlatform
WinHttpSetDefaultProxyConfiguration
WinHttpWriteData
msimg32
AlphaBlend
Sections
.text Size: 63KB - Virtual size: 63KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 194KB - Virtual size: 2.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 86KB - Virtual size: 86KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ