Static task
static1
Behavioral task
behavioral1
Sample
d4e4615da4f475bdefe201f7508a0508187ed1e50a4190e23a0c9bc8ef03e209.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d4e4615da4f475bdefe201f7508a0508187ed1e50a4190e23a0c9bc8ef03e209.exe
Resource
win10v2004-20240508-en
General
-
Target
d4e4615da4f475bdefe201f7508a0508187ed1e50a4190e23a0c9bc8ef03e209
-
Size
78KB
-
MD5
616402720ffe7f340f2f06e92f7cea5f
-
SHA1
3cc075607fd60d4002e5c766bfc4e5eb5cdc6528
-
SHA256
d4e4615da4f475bdefe201f7508a0508187ed1e50a4190e23a0c9bc8ef03e209
-
SHA512
45cf391ab6291a329d1957295ada94f89d8f61f18ff9810ef15c13e80e4dc52768184f625c907ba0855bb80abf08f135d40a2dda59d7226d538dfcdfbf94a517
-
SSDEEP
1536:Z00regK0p45FkLaeGnEnY3GbEiV1PbW9TvQTAQV4AcxdQ8SRZLNYV:Z00VKb5LTEnMi/KVvQ0QrcxS8qpNYV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d4e4615da4f475bdefe201f7508a0508187ed1e50a4190e23a0c9bc8ef03e209
Files
-
d4e4615da4f475bdefe201f7508a0508187ed1e50a4190e23a0c9bc8ef03e209.exe windows:4 windows x86 arch:x86
c4f59734f984cf21ed8a9009ec6fc0ed
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTickCount
SetErrorMode
GetShortPathNameA
FindFirstFileA
FindNextFileA
GetLastError
FindClose
GetFileAttributesA
MoveFileA
GetCommandLineA
GetStartupInfoA
CreateProcessA
OpenEventA
CreateEventA
OpenSemaphoreA
ReleaseSemaphore
WaitForSingleObject
CloseHandle
CreateSemaphoreA
SetEvent
GetLogicalDrives
GetDriveTypeA
InitializeCriticalSection
EnterCriticalSection
TerminateThread
CreateThread
LeaveCriticalSection
Sleep
ReadDirectoryChangesW
WideCharToMultiByte
GetModuleFileNameA
GetSystemDirectoryA
GetTempPathA
GetFileSize
SetFilePointer
ReadFile
GetProcAddress
LoadLibraryA
GetCurrentProcessId
GetCurrentThreadId
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
GetSystemTimeAsFileTime
TerminateProcess
InterlockedCompareExchange
InterlockedExchange
msvcr80
fopen
fclose
fwrite
strrchr
strcat_s
_unlock
_encode_pointer
__dllonexit
_lock
_onexit
_decode_pointer
_amsg_exit
__getmainargs
_cexit
_exit
_XcptFilter
exit
__initenv
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_crt_debugger_hook
_except_handler4_common
_invoke_watson
_controlfp_s
fflush
fprintf
strncmp
strcpy_s
strstr
srand
setlocale
??3@YAXPAX@Z
rand
??2@YAPAXI@Z
sprintf_s
_strlwr
memcpy
memset
__CxxFrameHandler3
Sections
.text Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ