Static task
static1
Behavioral task
behavioral1
Sample
27665bd3a7aec6534835e13fc9eb8ee0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
27665bd3a7aec6534835e13fc9eb8ee0N.exe
Resource
win10v2004-20240709-en
General
-
Target
27665bd3a7aec6534835e13fc9eb8ee0N.exe
-
Size
7.7MB
-
MD5
27665bd3a7aec6534835e13fc9eb8ee0
-
SHA1
56545ac983040ae0852f5d6a5f9ac6341052199d
-
SHA256
3eb48cc59834ac7f2bc2d50cfe0fa84d0131d7b440681d9f2aeb8aabe64c93ca
-
SHA512
97db37a85a6ca30856e0e5ce5e2fd9370f538cdfdc83fb4b11a6f73dce8f96aaff32ea98b787bb21aeac9fdb8747aa9a49b18f556aa688af5f145c8f205ed1f8
-
SSDEEP
196608:G288p8RT3OgtMwVajd4nXhE7OUGCZvb+CV4i8JRzY6SKb:G288+T3O6I2nXhE7OUGClb+CV4vD3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 27665bd3a7aec6534835e13fc9eb8ee0N.exe
Files
-
27665bd3a7aec6534835e13fc9eb8ee0N.exe.exe windows:6 windows x86 arch:x86
3edeaff8abef40c004b6f29fa270bade
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetStartupInfoW
LCMapStringW
SetStdHandle
FindClose
VirtualAlloc
TlsFree
GetTickCount
SetEvent
MoveFileExW
EnterCriticalSection
CreateFileW
GetCurrentDirectoryA
GetProcessAffinityMask
FindFirstFileW
SetLastError
GetProcAddress
FindNextFileW
SetFileAttributesW
GetSystemDirectoryW
GetModuleHandleW
HeapReAlloc
FormatMessageW
SetCurrentDirectoryW
RemoveDirectoryA
FreeEnvironmentStringsW
GetFileSize
UnhandledExceptionFilter
LoadLibraryA
ReadFile
WideCharToMultiByte
WakeAllConditionVariable
FreeLibraryAndExitThread
GetTempPathW
WriteConsoleW
GetACP
ReleaseSemaphore
TryAcquireSRWLockExclusive
HeapAlloc
SetFilePointerEx
CreateThread
TlsSetValue
GetCurrentThreadId
LocalFree
WaitForSingleObject
GetSystemInfo
IsProcessorFeaturePresent
GetVersionExA
TlsGetValue
LeaveCriticalSection
FindNextFileA
GlobalMemoryStatus
CloseHandle
CreateDirectoryA
GetFileType
CreateFileA
VirtualFree
HeapSize
GetCurrentDirectoryW
GetCurrentProcess
RaiseException
FindFirstFileA
GetModuleFileNameW
IsDebuggerPresent
QueryPerformanceFrequency
GetEnvironmentStringsW
LoadLibraryExW
SetCurrentDirectoryA
DeleteCriticalSection
GetProcessHeap
GetModuleFileNameA
GetCPInfo
CreateSemaphoreA
GetCommandLineA
SetUnhandledExceptionFilter
FreeLibrary
GetConsoleMode
RemoveDirectoryW
RtlUnwind
GetFileAttributesA
AcquireSRWLockExclusive
GetFileInformationByHandle
DeleteFileW
FlushFileBuffers
GetTickCount64
FindFirstFileExA
SetFilePointer
GetLastError
QueryPerformanceCounter
GetModuleHandleA
EncodePointer
InitializeCriticalSection
GetCurrentProcessId
LoadLibraryW
SetFileAttributesA
AreFileApisANSI
DecodePointer
GetModuleHandleExW
SetFileTime
CreateEventA
CreateDirectoryW
CreateProcessA
SetEndOfFile
ExitProcess
ResetEvent
IsBadReadPtr
DeleteFileA
IsValidCodePage
GetTempPathA
ReleaseSRWLockExclusive
GetSystemTimeAsFileTime
TerminateProcess
InitializeCriticalSectionEx
GetFileAttributesW
HeapFree
GetTempFileNameW
FormatMessageA
Sleep
GetOEMCP
WriteFile
GetStdHandle
GetVersion
GetCommandLineW
TlsAlloc
GetConsoleCP
GetStringTypeW
MultiByteToWideChar
InitializeSListHead
ExitThread
InitializeCriticalSectionAndSpinCount
user32
DialogBoxParamA
CharUpperW
LoadStringA
LoadIconA
SetWindowTextA
CharUpperA
KillTimer
GetDlgItem
DialogBoxParamW
EndDialog
MessageBoxA
GetWindowLongA
SetTimer
ShowWindow
LoadStringW
SetWindowLongA
MessageBoxW
SendMessageA
PostMessageA
DestroyWindow
SetWindowTextW
shell32
ShellExecuteExA
oleaut32
VariantClear
SysAllocStringLen
SysStringLen
advapi32
CloseServiceHandle
Sections
.text Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 570KB - Virtual size: 582KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ