Static task
static1
Behavioral task
behavioral1
Sample
46a0c26f11751279c6daada5a3f58fd0N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
46a0c26f11751279c6daada5a3f58fd0N.exe
Resource
win10v2004-20240709-en
General
-
Target
46a0c26f11751279c6daada5a3f58fd0N.exe
-
Size
274KB
-
MD5
46a0c26f11751279c6daada5a3f58fd0
-
SHA1
a8af245642bb631faf43c6321ee95cb7595597af
-
SHA256
684df606c3a66b42bd37baf2e7e3a251abb60a92ea8595ebec934562f3c1a16a
-
SHA512
927886afc648e1b1d023d4982200c297807449a956108d6659cda3212fec7ede784d57fa257a3b7f62708d6635e725e7f473debd0251757b8f51bd6b20d31006
-
SSDEEP
6144:UTNWZYZ3g3kmcY9qhJH/UdP8ZELavp5CLD1:SNGYcF9qhdQ8ZcL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 46a0c26f11751279c6daada5a3f58fd0N.exe
Files
-
46a0c26f11751279c6daada5a3f58fd0N.exe.exe windows:4 windows x86 arch:x86
88c87b34ef3375733fac0d48df28d3d8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
SetEnhMetaFileBits
CreateDIBitmap
LineTo
PatBlt
GetTextExtentPoint32A
DeleteDC
GetColorSpace
GetTextColor
SetRectRgn
PlayMetaFile
GetCharWidth32W
CopyEnhMetaFileW
SetMiterLimit
CreateCompatibleDC
EnumFontFamiliesW
CreateDCA
EndPage
CombineTransform
GetRgnBox
user32
ChangeDisplaySettingsW
LoadImageA
IsRectEmpty
GetClassInfoW
SetThreadDesktop
EnumDisplayDevicesW
EnumChildWindows
ReplyMessage
CallWindowProcA
GetWindowRect
EnableWindow
DispatchMessageW
CreateMenu
comdlg32
GetOpenFileNameW
PrintDlgA
wininet
DeleteUrlCacheEntryW
InternetConfirmZoneCrossingW
InternetSetOptionExA
InternetGoOnline
SetUrlCacheEntryInfoA
HttpSendRequestW
InternetQueryOptionA
InternetSetDialStateW
GopherFindFirstFileW
SetUrlCacheEntryInfoW
FtpOpenFileW
UrlZonesDetach
InternetGoOnlineW
GetUrlCacheEntryInfoExA
FindNextUrlCacheContainerA
HttpSendRequestExW
InternetSecurityProtocolToStringW
InternetCreateUrlA
InternetDial
kernel32
EnumSystemLocalesA
FindFirstFileExW
IsValidCodePage
VirtualAlloc
GetEnvironmentStringsW
InterlockedExchange
LCMapStringA
GetModuleFileNameA
GetCurrentThreadId
GetVolumeInformationA
WriteConsoleOutputCharacterA
GetDateFormatA
GetProcAddress
IsDebuggerPresent
SetHandleCount
EnumTimeFormatsA
SetEnvironmentVariableA
TlsGetValue
GetOEMCP
MultiByteToWideChar
GetCurrentThread
VirtualFree
HeapAlloc
MoveFileExW
SetFileTime
GetCommandLineA
GetStringTypeW
SetConsoleCtrlHandler
SetUnhandledExceptionFilter
SetLastError
GetLocaleInfoW
SetConsoleTitleA
LocalLock
GetTimeZoneInformation
HeapReAlloc
GetCPInfo
TlsAlloc
GetLastError
WideCharToMultiByte
WriteFile
TlsSetValue
GetStdHandle
EnterCriticalSection
LeaveCriticalSection
GetSystemTimeAsFileTime
DeleteCriticalSection
GetModuleHandleW
HeapFree
GetTickCount
CompareStringW
GetDiskFreeSpaceExW
GetShortPathNameW
FreeEnvironmentStringsA
GetStringTypeA
ExitProcess
lstrcmpiA
GetStartupInfoA
IsValidLocale
EnumCalendarInfoExA
InterlockedDecrement
QueryPerformanceCounter
InitializeCriticalSectionAndSpinCount
GetTimeFormatA
GetTempPathW
CompareStringA
HeapCreate
LoadLibraryA
LCMapStringW
GetModuleHandleA
UnhandledExceptionFilter
RtlUnwind
TlsFree
GetEnvironmentStrings
VirtualQuery
GetLocaleInfoA
GetACP
GetCurrentProcess
Sleep
InterlockedIncrement
FreeEnvironmentStringsW
WriteConsoleOutputAttribute
HeapDestroy
FindAtomW
HeapSize
FreeLibrary
TerminateProcess
MapViewOfFileEx
GetUserDefaultLCID
lstrcat
GetFileType
GetCurrentProcessId
Sections
.text Size: 126KB - Virtual size: 126KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 138KB - Virtual size: 158KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ