Static task
static1
Behavioral task
behavioral1
Sample
1466ee1fde7207d1844fd2b265388fa0N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
1466ee1fde7207d1844fd2b265388fa0N.exe
Resource
win10v2004-20240730-en
General
-
Target
1466ee1fde7207d1844fd2b265388fa0N.exe
-
Size
2.2MB
-
MD5
1466ee1fde7207d1844fd2b265388fa0
-
SHA1
3a4bc0952ec62dfd177e82bc33561f0350f08499
-
SHA256
4b72c3ad0c3b60c85d26e49c88ae2be9db0b89ad8febff67cda377459652e033
-
SHA512
9ff9e3412756058364f5c5eeba24ca97185380d5d51bb0088f1814c16d8ec2daa6f8a6e8ee8b23e3c0ebaec54eab0711dcbbf18d23e47821aac867ab3ba185b0
-
SSDEEP
49152:jUjdJr8OLs7ZAkTS6KgwO0zUxy6bmtn7dIrJl5C5ETQ39yTfHQ:jUjdR8+s7ZAk+6DwrzwKtn7qVl5IEQ3X
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1466ee1fde7207d1844fd2b265388fa0N.exe -
NSIS installer 1 IoCs
resource yara_rule sample nsis_installer_2
Files
-
1466ee1fde7207d1844fd2b265388fa0N.exe.exe windows:5 windows x86 arch:x86
eff8e8f7bfed5b77eeceb4aeec3471e0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
RegisterClassA
SystemParametersInfoA
CreateWindowExA
GetClassInfoA
DialogBoxParamA
SetWindowPos
IsWindowEnabled
SetClassLongA
GetSystemMenu
EnableMenuItem
EndDialog
GetSystemMetrics
CreatePopupMenu
AppendMenuA
GetWindowRect
SetDlgItemTextA
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
LoadBitmapA
IsWindowVisible
CallWindowProcA
GetMessagePos
ScreenToClient
CheckDlgButton
LoadCursorA
SetCursor
GetWindowLongA
GetSysColor
CharNextA
GetDlgItemTextA
MessageBoxIndirectA
CharPrevA
DispatchMessageA
PeekMessageA
TrackPopupMenu
ExitWindowsEx
DestroyWindow
CreateDialogParamA
SetTimer
SetWindowTextA
PostQuitMessage
SetForegroundWindow
ShowWindow
wsprintfA
SendMessageTimeoutA
FindWindowExA
IsWindow
GetDlgItem
SetWindowLongA
LoadImageA
GetDC
EnableWindow
InvalidateRect
SendMessageA
DefWindowProcA
BeginPaint
GetClientRect
FillRect
DrawTextA
EndPaint
kernel32
RemoveDirectoryA
GetSystemDirectoryA
LoadLibraryA
lstrcatA
lstrlenA
GetTempFileNameA
CreateProcessA
CreateThread
GlobalLock
GlobalUnlock
GetDiskFreeSpaceA
lstrcpynA
SetErrorMode
GetVersion
GetCommandLineA
GetTempPathA
GetWindowsDirectoryA
ExitProcess
CopyFileA
GetCurrentProcess
GetModuleFileNameA
GetFileSize
CreateFileA
GetTickCount
Sleep
SetFileAttributesA
CreateDirectoryA
GetLastError
GetFileAttributesA
SetCurrentDirectoryA
MoveFileA
GetFullPathNameA
GetShortPathNameA
SearchPathA
CompareFileTime
SetFileTime
CloseHandle
MulDiv
DeleteFileA
FindFirstFileA
FindNextFileA
FindClose
SetFilePointer
ReadFile
WriteFile
GetPrivateProfileStringA
WritePrivateProfileStringA
MultiByteToWideChar
FreeLibrary
GetProcAddress
LoadLibraryExA
GetModuleHandleA
GlobalFree
GetExitCodeProcess
WaitForSingleObject
GlobalAlloc
ExpandEnvironmentStringsA
lstrcmpA
lstrcmpiA
shell32
SHGetSpecialFolderLocation
SHBrowseForFolderA
SHGetPathFromIDListA
SHGetFileInfoA
ShellExecuteA
SHFileOperationA
advapi32
RegDeleteKeyA
RegCloseKey
RegEnumKeyA
RegOpenKeyExA
RegEnumValueA
RegQueryValueExA
RegSetValueExA
RegCreateKeyExA
RegDeleteValueA
SetFileSecurityA
comctl32
ImageList_Destroy
ord17
ImageList_AddMasked
ImageList_Create
gdi32
SelectObject
SetTextColor
SetBkMode
CreateFontIndirectA
CreateBrushIndirect
DeleteObject
GetDeviceCaps
SetBkColor
ole32
CoTaskMemFree
OleInitialize
OleUninitialize
CoCreateInstance
ntdll
_allshl
_aulldiv
_aulldvrm
_allmul
_alldiv
_allshr
_allrem
Sections
.text Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 247KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ndata Size: - Virtual size: 520KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 26KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ