Static task
static1
Behavioral task
behavioral1
Sample
04b2e29f8fab0fb6376ac2a1324bd075628e7a35ea459e9ffa2a101ffa5f3aed.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
04b2e29f8fab0fb6376ac2a1324bd075628e7a35ea459e9ffa2a101ffa5f3aed.exe
Resource
win10v2004-20240704-en
General
-
Target
04b2e29f8fab0fb6376ac2a1324bd075628e7a35ea459e9ffa2a101ffa5f3aed.exe
-
Size
39KB
-
MD5
1fccbe75e3a65cc52fb7524e7da41130
-
SHA1
2447c0f33e11ab879ed2de1e9a8ba4aaca2a6502
-
SHA256
04b2e29f8fab0fb6376ac2a1324bd075628e7a35ea459e9ffa2a101ffa5f3aed
-
SHA512
156c526aa8c8d55d893a8ae97f36e64983108724cd8cfe0e779168f47263dc1d5e389e6e9f28c06b0a3d3db030954607d0f2143db1186138575b52b3058618d9
-
SSDEEP
768:qfRygBbJj0dRwzgvysfjEe4VmGTNpt6ju5NE4:qZTBFoRpqEEpVTNy74
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 04b2e29f8fab0fb6376ac2a1324bd075628e7a35ea459e9ffa2a101ffa5f3aed.exe
Files
-
04b2e29f8fab0fb6376ac2a1324bd075628e7a35ea459e9ffa2a101ffa5f3aed.exe.exe windows:5 windows x86 arch:x86
0c04f28339acdd43cd6fb9855519e957
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
SetBkMode
SetBrushOrgEx
SetMapMode
SetMetaFileBitsEx
SetPixel
SetPolyFillMode
SetROP2
SetStretchBltMode
SetTextAlign
SetTextColor
SetViewportExtEx
SetViewportOrgEx
SetWindowExtEx
SetWindowOrgEx
SetWinMetaFileBits
StartDocW
StartPage
StretchBlt
StretchDIBits
kernel32
MapViewOfFile
MulDiv
MultiByteToWideChar
OpenEventA
OpenFileMappingA
OutputDebugStringA
OutputDebugStringW
PeekNamedPipe
PostQueuedCompletionStatus
PulseEvent
QueryPerformanceCounter
WaitForMultipleObjects
WaitForSingleObject
WideCharToMultiByte
WriteConsoleA
WriteConsoleW
WriteFile
ExitProcess
FindClose
FindFirstFileA
FindFirstFileW
FindNextFileA
FindNextFileW
FindResourceW
FlushFileBuffers
FormatMessageA
FormatMessageW
FreeConsole
GetACP
GetDiskFreeSpaceA
GetDiskFreeSpaceExW
GetDiskFreeSpaceW
GetEnvironmentVariableA
GetEnvironmentVariableW
GetExitCodeProcess
GetExitCodeThread
GetFullPathNameW
GetLocaleInfoW
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleA
GetProcessHeap
GetProfileStringW
GetQueuedCompletionStatus
GetShortPathNameW
GetStartupInfoA
GetSystemInfo
GetSystemTimeAsFileTime
GetTempFileNameW
GetTempPathA
GetTempPathW
GetUserDefaultLCID
GetVersion
GetVersionExA
GetVersionExW
GetVersionExW
HeapAlloc
InitializeCriticalSection
InitializeCriticalSectionAndSpinCount
InterlockedCompareExchange
InterlockedDecrement
InterlockedExchange
InterlockedExchangeAdd
InterlockedIncrement
IsDBCSLeadByteEx
IsValidCodePage
IsValidLocale
pdh
PdhValidatePathA
user32
CreateAcceleratorTableW
CreateIconIndirect
CreateMenu
CreatePopupMenu
CreateWindowExW
DdeClientTransaction
DdeConnect
DdeCreateDataHandle
DdeCreateStringHandleW
DdeDisconnect
GetMessageA
LoadIconA
RegisterClassA
Sections
.text Size: 512B - Virtual size: 35B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ