Static task
static1
Behavioral task
behavioral1
Sample
cGFmaXNoNjQK.exe
Resource
win10-20240611-en
General
-
Target
cGFmaXNoNjQK.exe
-
Size
120KB
-
MD5
539784bf443ce8ee6d0e48a325c75960
-
SHA1
72e92d7e0c34e23d22afd382b911c5f8dc01583f
-
SHA256
94de1cacf61223285ee8fef5f9e8b76c9c3edd769099a34c923360c5f605bc0a
-
SHA512
e51652f3069f757f8b280b71bdfeb25d991c0de9f331428dc26a8d55a5fc8f2ab2a28da51c4fa72d82a16fd721977bb0c15c85a31bb3c9fa1d7afc0beb908f38
-
SSDEEP
3072:UkTKFwiUQGQ32EA6Nehdv3I0lmPIe1tKLpTyrOMGTkrNRD:lWvp3Yze1tgp/MGTuNR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource cGFmaXNoNjQK.exe
Files
-
cGFmaXNoNjQK.exe.exe windows:4 windows x64 arch:x64
ce70cfbfa448b27b994aff06452e0b00
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
GetUserNameA
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
iphlpapi
GetAdaptersAddresses
kernel32
CloseHandle
CreateFileA
CreateToolhelp32Snapshot
DeleteCriticalSection
DeviceIoControl
EnterCriticalSection
GetConsoleScreenBufferInfo
GetConsoleWindow
GetCurrentProcess
GetDiskFreeSpaceExA
GetDriveTypeA
GetFileAttributesA
GetLastError
GetLogicalDriveStringsA
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetStartupInfoA
GetStdHandle
GetSystemInfo
GetSystemTimeAsFileTime
GetTickCount
GetVersionExA
GlobalMemoryStatusEx
InitializeCriticalSection
IsDBCSLeadByteEx
IsDebuggerPresent
LeaveCriticalSection
LocalAlloc
LocalFree
MultiByteToWideChar
OutputDebugStringA
Process32First
Process32Next
SetConsoleTextAttribute
SetLastError
SetUnhandledExceptionFilter
Sleep
TlsGetValue
VirtualProtect
VirtualQuery
WideCharToMultiByte
lstrcmpiA
mpr
WNetGetProviderNameA
msvcrt
__C_specific_handler
___lc_codepage_func
___mb_cur_max_func
__getmainargs
__initenv
__iob_func
__set_app_type
__setusermatherr
_acmdln
_amsg_exit
_cexit
_commode
_errno
_fmode
_initterm
_lock
_onexit
_unlock
abort
calloc
exit
fclose
fopen
fprintf
fputc
fputs
free
fwrite
getchar
localeconv
malloc
mbstowcs
memcmp
memcpy
memset
rand
signal
srand
strerror
strlen
strncat
strncmp
strncpy
strstr
toupper
vfprintf
wcslen
wcsstr
ole32
CoCreateInstance
CoInitializeEx
CoInitializeSecurity
CoUninitialize
oleaut32
SysAllocString
SysFreeString
user32
CallNextHookEx
CreateWindowExW
DefWindowProcW
DestroyWindow
DispatchMessageA
FindWindowA
GetClientRect
GetCursorPos
GetDoubleClickTime
GetMessageA
GetSysColorBrush
GetSystemMetrics
GetWindowRect
KillTimer
LoadCursorA
MessageBeep
PostMessageA
PostQuitMessage
RegisterClassW
SetTimer
SetWindowsHookExA
ShowWindow
TranslateMessage
UnhookWindowsHookEx
winhttp
WinHttpCloseHandle
WinHttpConnect
WinHttpOpen
WinHttpOpenRequest
WinHttpReceiveResponse
WinHttpSendRequest
WinHttpWriteData
Sections
.text Size: 46KB - Virtual size: 46KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 240B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 4KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 96B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 264B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ