Static task
static1
Behavioral task
behavioral1
Sample
d7a2938fedcc54fdbfc400ed6f074003c0b2c1219f98b9f0c27d09dcdb14e12d.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d7a2938fedcc54fdbfc400ed6f074003c0b2c1219f98b9f0c27d09dcdb14e12d.exe
Resource
win10v2004-20240730-en
General
-
Target
d7a2938fedcc54fdbfc400ed6f074003c0b2c1219f98b9f0c27d09dcdb14e12d
-
Size
902KB
-
MD5
a4fabe6f905bbdc2e9a6a9478dad33f6
-
SHA1
5b5e78e1424395b38ecf029841f7fe5646d01b5f
-
SHA256
d7a2938fedcc54fdbfc400ed6f074003c0b2c1219f98b9f0c27d09dcdb14e12d
-
SHA512
c99c69fb280fc2831487f85e73af4c0d120c5a57673aafb001a23cb1272ac93dc41c1f8f49f0ee87771daf943011038b5f6150932c4f392c93f047d7fb2b65ed
-
SSDEEP
24576:RivtCXWeGK/8f7bi7ONIzgo94+Kyr6hH5:ctCXWPnni9A95
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d7a2938fedcc54fdbfc400ed6f074003c0b2c1219f98b9f0c27d09dcdb14e12d
Files
-
d7a2938fedcc54fdbfc400ed6f074003c0b2c1219f98b9f0c27d09dcdb14e12d.exe windows:5 windows x86 arch:x86
07afe1e0c9da7fec9e5f700881a1f162
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetLastError
MultiByteToWideChar
WideCharToMultiByte
LoadLibraryExW
GetModuleFileNameW
LocalFree
FormatMessageW
GetSystemDirectoryW
CloseHandle
SetFileTime
CreateFileW
SetFileAttributesW
RemoveDirectoryW
GetProcAddress
GetModuleHandleW
CreateDirectoryW
DeleteFileW
SetCurrentDirectoryW
GetCurrentDirectoryW
GetTempPathW
SetLastError
GetCurrentProcessId
GetTickCount
GetCurrentThreadId
FindClose
FindFirstFileW
FindNextFileW
GetModuleHandleA
GetFileAttributesW
GetFileSize
SetFilePointer
ReadFile
WriteFile
SetEndOfFile
GetProcessAffinityMask
GetCurrentProcess
GetSystemInfo
GlobalMemoryStatus
GetFileInformationByHandle
GetStdHandle
WaitForMultipleObjects
Sleep
VirtualAlloc
VirtualFree
GetVersionExW
lstrcatW
lstrlenW
WaitForSingleObject
CreateEventW
SetEvent
ResetEvent
InitializeCriticalSection
GetExitCodeProcess
CreateProcessW
GetCommandLineW
HeapSize
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
InitializeCriticalSectionAndSpinCount
GetLocaleInfoA
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
LoadLibraryA
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
ExitProcess
HeapCreate
RtlUnwind
RaiseException
HeapAlloc
HeapFree
HeapReAlloc
ExitThread
CreateThread
GetCommandLineA
GetStartupInfoA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetModuleFileNameA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
InterlockedDecrement
TerminateProcess
IsDebuggerPresent
user32
DestroyWindow
LoadIconW
EndDialog
KillTimer
SetTimer
SetWindowTextW
PostMessageW
SendMessageW
MessageBoxW
DialogBoxParamW
GetWindowLongW
SetWindowLongW
ShowWindow
LoadStringW
CharUpperW
GetDlgItem
shell32
ShellExecuteExW
oleaut32
VariantClear
SysAllocStringLen
SysStringLen
Sections
.text Size: 130KB - Virtual size: 130KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 30KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 183KB - Virtual size: 183KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ