Static task
static1
Behavioral task
behavioral1
Sample
4dc655ee8e777557f5ab13a6c1bb3e70N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4dc655ee8e777557f5ab13a6c1bb3e70N.exe
Resource
win10v2004-20240709-en
General
-
Target
4dc655ee8e777557f5ab13a6c1bb3e70N.exe
-
Size
304KB
-
MD5
4dc655ee8e777557f5ab13a6c1bb3e70
-
SHA1
9c5f916dd0891b63c26fd0a4b26ae3c43161e663
-
SHA256
8d022f7497be6b65c0b2d89077416604e2949e52ff5b1389a37fa17c4dc1d91e
-
SHA512
5aa913d25c9906634cc1bfff2aacd7398bc179b09fac5a25f729fd33dbc7bafcb27886c2c7e1e05e08b6fc57f3665327dbbe3a1c6e70e56de9409e65935a3bb8
-
SSDEEP
3072:T7vHbtGXRvjxCb5NgXDY7uSlkJcUa7kYQTcqW2NdQQGH/UDhSCUc4aqTB3RtDYUl:fclKgzelZNQSBQGH/CSpWqTqUjD5ymQe
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4dc655ee8e777557f5ab13a6c1bb3e70N.exe
Files
-
4dc655ee8e777557f5ab13a6c1bb3e70N.exe.exe windows:4 windows x86 arch:x86
b6096454c0b0666c7e487d2e3e0cbf92
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_ISOLATION
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileA
GetFileSize
FindResourceA
SetFilePointer
FreeLibrary
LoadResource
UpdateResourceA
SetFileTime
WriteFile
GetDriveTypeA
SizeofResource
GetFileAttributesA
ReadFile
MultiByteToWideChar
FindFirstFileA
GetLastError
CopyFileA
SetFileAttributesA
FindClose
LockResource
BeginUpdateResourceA
GetModuleFileNameA
FindNextFileA
LoadLibraryExA
EnumResourceNamesA
GetFileTime
EndUpdateResourceA
WinExec
CloseHandle
DeleteFileA
CompareStringW
CompareStringA
FlushFileBuffers
GetTimeFormatA
GetDateFormatA
GetSystemTimeAsFileTime
GetCommandLineA
HeapFree
GetVersionExA
HeapAlloc
GetProcessHeap
GetStartupInfoA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetProcAddress
GetModuleHandleA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
GetCPInfo
GetACP
GetOEMCP
Sleep
WideCharToMultiByte
GetTimeZoneInformation
RaiseException
ExitProcess
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetConsoleCP
GetConsoleMode
EnterCriticalSection
LeaveCriticalSection
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
VirtualAlloc
HeapReAlloc
HeapSize
LoadLibraryA
InitializeCriticalSection
RtlUnwind
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
ole32
CoUninitialize
CoCreateInstance
CoInitialize
rpcrt4
RpcMgmtEpUnregister
Sections
.text Size: 52KB - Virtual size: 49KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 140KB - Virtual size: 146KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rmnet Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.l1 Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.l2 Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ