Static task
static1
Behavioral task
behavioral1
Sample
1992aa12ce8a82991eed74ef987403a956c1a2b53d333a13a1dfa49eb6695323.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
1992aa12ce8a82991eed74ef987403a956c1a2b53d333a13a1dfa49eb6695323.exe
Resource
win10-20240611-en
General
-
Target
1992aa12ce8a82991eed74ef987403a956c1a2b53d333a13a1dfa49eb6695323
-
Size
485KB
-
MD5
d39a20fd19892439847037745f81a036
-
SHA1
cdb263a9558ff13649446dfa6af94ec26b208cd1
-
SHA256
1992aa12ce8a82991eed74ef987403a956c1a2b53d333a13a1dfa49eb6695323
-
SHA512
0910ed40600e2cacf9cecb31fd9e2fb628a42ed2f50e873a2a44d74529c6cae4d2f378b259372106fc90f4f5babd1d99d81c096523609470d523093e563997f0
-
SSDEEP
12288:AXS+1BlXqUlPxMtExpePQmwsnCAph0lhSMXlCuSKLZP:AX9qUpqn9h0lhSMXlhS2P
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1992aa12ce8a82991eed74ef987403a956c1a2b53d333a13a1dfa49eb6695323
Files
-
1992aa12ce8a82991eed74ef987403a956c1a2b53d333a13a1dfa49eb6695323.exe windows:6 windows x86 arch:x86
23f692f4e52a797ff94d704b8daf6feb
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetClipboardData
EmptyClipboard
CloseClipboard
OpenClipboard
SetClipboardData
advapi32
GetCurrentHwProfileW
GetUserNameW
RegCloseKey
RegSetValueExW
RegOpenKeyExW
wininet
HttpOpenRequestA
InternetQueryDataAvailable
InternetCloseHandle
InternetOpenA
HttpSendRequestA
InternetConnectA
InternetReadFile
HttpQueryInfoW
kernel32
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
IsValidLocale
GetCommandLineA
FindNextFileW
FindFirstFileExW
FindClose
CompareStringEx
InitializeCriticalSectionEx
LCMapStringEx
CreateDirectoryW
GetModuleFileNameW
GetFileAttributesW
SetFileAttributesW
MoveFileW
Sleep
GlobalAlloc
GlobalLock
ExitProcess
GlobalUnlock
MultiByteToWideChar
WideCharToMultiByte
CreateMutexA
ReleaseMutex
OpenMutexA
CloseHandle
GetGeoInfoA
GetLastError
GetUserGeoID
GetComputerNameW
GetSystemTimeAsFileTime
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
GetCurrentThreadId
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
LCMapStringW
GetLocaleInfoW
GetUserDefaultLCID
EnumSystemLocalesW
HeapAlloc
HeapReAlloc
HeapFree
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
GetStdHandle
GetFileType
GetStartupInfoW
RaiseException
SetFilePointerEx
GetConsoleMode
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetModuleHandleW
GetModuleHandleExW
GetStringTypeW
GetProcessHeap
SetStdHandle
CreateFileW
FlushFileBuffers
WriteFile
GetConsoleOutputCP
EncodePointer
DecodePointer
WriteConsoleW
HeapSize
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
WakeAllConditionVariable
SleepConditionVariableSRW
QueryPerformanceCounter
GetCurrentProcessId
InitializeSListHead
RtlUnwind
shell32
SHGetFolderPathW
Sections
.text Size: 272KB - Virtual size: 272KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 195KB - Virtual size: 195KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ