Static task
static1
Behavioral task
behavioral1
Sample
d44281e2cc355bcfd174f8ada5dca1ba5001ed3faaa5acfe3883c5c60e8d2be0.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d44281e2cc355bcfd174f8ada5dca1ba5001ed3faaa5acfe3883c5c60e8d2be0.exe
Resource
win10v2004-20240704-en
General
-
Target
d44281e2cc355bcfd174f8ada5dca1ba5001ed3faaa5acfe3883c5c60e8d2be0
-
Size
276KB
-
MD5
c002784bcba8e4f954f222e187eaf605
-
SHA1
db77d2d7b4ba3873ac884d22393b14faea7a17fb
-
SHA256
d44281e2cc355bcfd174f8ada5dca1ba5001ed3faaa5acfe3883c5c60e8d2be0
-
SHA512
c49e9f25af13c95959a503e8ef621bf47e09e1bb1a1e1fb0a7462054a9c03b816ac907025629b638275ff84fcd502ebd66b1b3917bfef1d836cd4da9ee0ced33
-
SSDEEP
6144:5ST/k0YujFn2CfBoZG3gLm5WelllPJ7ImcS:AsxujcCfOBoDN9Im5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d44281e2cc355bcfd174f8ada5dca1ba5001ed3faaa5acfe3883c5c60e8d2be0
Files
-
d44281e2cc355bcfd174f8ada5dca1ba5001ed3faaa5acfe3883c5c60e8d2be0.exe windows:5 windows x86 arch:x86
2b3fe42b59a6c54c1699187a146367d7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetEnvironmentVariableA
GetFileAttributesA
GetLastError
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetStartupInfoA
GetSystemTimeAsFileTime
GetTickCount
GetCommandLineW
LoadLibraryA
QueryPerformanceCounter
ReleaseMutex
SetErrorMode
SetUnhandledExceptionFilter
TerminateProcess
UnhandledExceptionFilter
WaitForSingleObject
lstrcpynA
lstrlenA
lstrlenW
FreeLibrary
ExitProcess
CreateMutexA
CloseHandle
GetSystemDirectoryA
lstrcatA
CreateFileA
VirtualAlloc
GetCPInfo
ReadFile
GetVersionExA
user32
LoadIconW
LoadIconA
advapi32
OpenProcessToken
RegCloseKey
LookupPrivilegeValueW
LookupAccountSidW
GetTokenInformation
AdjustTokenPrivileges
RegOpenKeyExW
RegQueryValueExW
RegSetValueExW
RegConnectRegistryW
msvcrt
_XcptFilter
__CxxFrameHandler
__p__commode
__p__fmode
__set_app_type
__setusermatherr
__wgetmainargs
__winitenv
_adjust_fdiv
_c_exit
_cexit
_controlfp
_except_handler3
_exit
_initterm
_iob
_wcsicmp
_wcsnicmp
_wgetcwd
_wtol
calloc
exit
fflush
fprintf
free
malloc
realloc
sprintf
strtok
wcschr
wcslen
wcsncmp
wcsncpy
wcsstr
wcstod
wcstok
wcstol
Sections
.text Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 30KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 207KB - Virtual size: 208KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata4 Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata3 Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata2 Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.aspack Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.htext Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE