Static task
static1
Behavioral task
behavioral1
Sample
a2174bc47305cd840aa79423ea8d3020N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a2174bc47305cd840aa79423ea8d3020N.exe
Resource
win10v2004-20240709-en
General
-
Target
a2174bc47305cd840aa79423ea8d3020N.exe
-
Size
415KB
-
MD5
a2174bc47305cd840aa79423ea8d3020
-
SHA1
635db81e7cab5150b29a40d4e67003a4278de268
-
SHA256
0cf7a1e410cd0588b2b2b411d3ee56d21c9c129e27e2004a5906bd2c70690dcb
-
SHA512
16fe92593767a6ba6ad030719c7e96edf80693a2e951a481ebbace5adf22fa1b50ed9873cea8f5804aa27a8afc15bd65b3b9b66b3c4ab2453837e41b2c1df5c2
-
SSDEEP
12288:u7QDCy2D4xp9fuQxWBxC1V10k4OfLtlD:f9tDudaV10nU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a2174bc47305cd840aa79423ea8d3020N.exe
Files
-
a2174bc47305cd840aa79423ea8d3020N.exe.exe windows:4 windows x86 arch:x86
ad81d37a46de6f761358d7b4d9d9dbc3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTempFileNameA
GetVersion
GetPrivateProfileSectionNamesW
GetPrivateProfileIntA
GetFileType
GetComputerNameA
HeapAlloc
LoadLibraryA
WaitForDebugEvent
VirtualFree
Sleep
GetCommandLineW
GetOEMCP
LocalSize
InterlockedExchange
TlsGetValue
GetModuleHandleW
GetStartupInfoA
GetStartupInfoW
LockFile
FreeEnvironmentStringsA
DeleteCriticalSection
GetStdHandle
EnterCriticalSection
InterlockedDecrement
InitializeCriticalSection
GetEnvironmentStrings
GetModuleFileNameW
GetProcAddress
GetThreadContext
GetLastError
HeapFree
CopyFileA
ReadFile
ReadFileEx
IsBadWritePtr
VirtualQuery
UnhandledExceptionFilter
LeaveCriticalSection
WriteFile
SetTimeZoneInformation
MultiByteToWideChar
WaitForSingleObject
GetEnvironmentStringsW
HeapReAlloc
TlsSetValue
ExitProcess
LCMapStringA
GetProcessAffinityMask
VirtualAlloc
TerminateProcess
QueryPerformanceCounter
GetCurrentProcess
TlsAlloc
GetModuleHandleA
GetCommandLineA
SetHandleCount
SetLastError
GetCurrentThreadId
RtlUnwind
HeapCreate
GetLogicalDriveStringsW
GetCurrentThread
GetCurrentProcessId
GetModuleFileNameA
TlsFree
GetFileAttributesA
CopyFileExA
GetTickCount
HeapDestroy
SetCurrentDirectoryW
FreeEnvironmentStringsW
GetSystemTimeAsFileTime
advapi32
CryptGenRandom
CryptDeriveKey
CryptSetProviderExW
CryptEncrypt
RegReplaceKeyA
RegEnumValueW
GetUserNameW
RegSetValueA
wininet
InternetOpenUrlW
FindNextUrlCacheEntryA
HttpEndRequestA
InternetUnlockRequestFile
FtpSetCurrentDirectoryW
CreateUrlCacheContainerA
FtpDeleteFileA
CommitUrlCacheEntryA
RetrieveUrlCacheEntryFileW
InternetGetCertByURLA
FtpRemoveDirectoryA
FtpGetFileA
InternetWriteFileExW
InternetGetCertByURL
RegisterUrlCacheNotification
InternetHangUp
HttpEndRequestW
InternetOpenW
GetUrlCacheEntryInfoExW
gdi32
SetSystemPaletteUse
SetMapMode
CreatePalette
GetTextExtentPoint32W
RoundRect
GetFontData
RemoveFontResourceA
GetOutlineTextMetricsA
ChoosePixelFormat
AbortDoc
PolyTextOutW
SetROP2
EnumFontFamiliesExW
ExcludeClipRect
OffsetViewportOrgEx
CreateHatchBrush
EnumMetaFile
GetCharWidthFloatA
GetCharWidthA
GetTextExtentPointW
Sections
.text Size: 109KB - Virtual size: 109KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 302KB - Virtual size: 302KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ