Static task
static1
Behavioral task
behavioral1
Sample
55ffb01e27275dca5417dff5b0e40770N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
55ffb01e27275dca5417dff5b0e40770N.exe
Resource
win10v2004-20240709-en
General
-
Target
55ffb01e27275dca5417dff5b0e40770N.exe
-
Size
203KB
-
MD5
55ffb01e27275dca5417dff5b0e40770
-
SHA1
d1b044d813147dc61e9bd1c74c9c68e1cf4cfa6a
-
SHA256
d8841e7339ae91ca34601f48dad101e1174fe76e81310f48d4006e87b8e93930
-
SHA512
cf8a599e206ac293bf13382059be94dd1f3a574f75647910a1d879813ff8228c8c9eb609248b8a23e89fbcba8432dc79a63d953c2a7f6892d1a4671a57c59c00
-
SSDEEP
3072:g1g2ZB+GEhO118/bPyKxM4QTJt2cWGsNPKisJoyjK7yGAe9Q0enyU8GZqaP+wPml:6hYzxMlNNsAisDRGAL0eyUBnPrPO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 55ffb01e27275dca5417dff5b0e40770N.exe
Files
-
55ffb01e27275dca5417dff5b0e40770N.exe.exe windows:4 windows x86 arch:x86
3b42f9693bdd770281b738cfac146ecf
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
AddAtomW
lstrcpynW
GetModuleFileNameA
GetFileType
GetEnvironmentStringsA
GetProcAddress
BeginUpdateResourceW
GetCurrentThreadId
CreateMailslotW
AddAtomA
lstrlen
GetEnvironmentStringsW
GetExpandedNameA
WinExec
GetCurrentProcessId
GetThreadPriority
FindAtomA
OpenWaitableTimerW
GetModuleHandleA
GetLocaleInfoA
GetDateFormatA
GetShortPathNameW
user32
GetParent
CreateWindowExA
SetDlgItemTextW
DestroyIcon
GetDlgItemInt
IsWindow
IsMenu
PostMessageA
SetWindowLongW
GetWindowTextW
CallWindowProcW
GetCapture
GetSubMenu
InvalidateRect
DestroyWindow
GetDlgItem
WinHelpA
GetSystemMetrics
SetCursorPos
CreateCaret
CascadeWindows
EnumDesktopsA
GetDCEx
EndDialog
CreatePopupMenu
GetMessageA
GetCursorPos
CreateAcceleratorTableW
GetTopWindow
SetWindowRgn
SendMessageA
gdi32
ColorMatchToTarget
CreateCompatibleDC
Pie
CopyMetaFileW
ExtTextOutW
GetTextColor
SetColorAdjustment
CreatePatternBrush
SetMetaRgn
ExtFloodFill
GetEnhMetaFileDescriptionA
SetTextColor
ExtSelectClipRgn
AddFontResourceW
EndDoc
GetTextFaceW
GetCharacterPlacementA
GetMetaFileA
advapi32
RegOpenKeyW
RegFlushKey
RegOpenKeyA
shlwapi
GetMenuPosFromID
PathUnmakeSystemFolderA
UrlIsNoHistoryW
PathIsURLA
SHCreateShellPalette
PathRemoveArgsW
SHCopyKeyW
SHRegOpenUSKeyA
PathSearchAndQualifyW
Sections
.eX Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.ah Size: 2KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.wc Size: 512B - Virtual size: 402KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.cKgaFt Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.JbcCcw Size: 5KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 172KB - Virtual size: 171KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 928B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ