Static task
static1
Behavioral task
behavioral1
Sample
82575dc33640a21845c5e52fcc47d490N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
82575dc33640a21845c5e52fcc47d490N.exe
Resource
win10v2004-20240730-en
General
-
Target
82575dc33640a21845c5e52fcc47d490N.exe
-
Size
156KB
-
MD5
82575dc33640a21845c5e52fcc47d490
-
SHA1
e6bb0b5c719d1e88ac5ffc7b2be05ca286626e99
-
SHA256
d99e6228f13ebb82e40c86c76eab4f29bbc25f91bbc19f72fddffc2fa1325ed6
-
SHA512
e2570fd897d2131c87f2f1b8243a51b267630bc1a54308fe9cd9fee693e80a343be98f672d83db8bc617755bd80833edbdbe13eb0e2cee338bfb7c5fd9383fb5
-
SSDEEP
3072:okvH+OOUYjo0i2JdvIArAVMBWfvgfJYraeL/qHQl:rH+Fo2JxeMw3g42HQl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 82575dc33640a21845c5e52fcc47d490N.exe
Files
-
82575dc33640a21845c5e52fcc47d490N.exe.exe windows:5 windows x86 arch:x86
010cd00be12caab1cb6db908d85a08da
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
memcpy
_snprintf
memset
netapi32
NetQueryDisplayInformation
NetApiBufferFree
NetUserGetInfo
shell32
ord680
shlwapi
StrStrIA
PathFileExistsA
ntdll
RtlCreateUserThread
RtlAdjustPrivilege
kernel32
GlobalFindAtomA
GetModuleFileNameW
GlobalAddAtomA
WriteProcessMemory
VirtualAllocEx
CreateProcessA
CreateRemoteThread
MultiByteToWideChar
FlushInstructionCache
Sleep
ExitProcess
HeapValidate
GetProcessHeap
HeapFree
HeapAlloc
GetTempPathA
GetTempFileNameA
CopyFileA
GetProcAddress
GetModuleFileNameA
GetModuleHandleA
GetTickCount
GetVolumeInformationA
GetSystemWindowsDirectoryA
VirtualQuery
GetCurrentProcess
VirtualFree
VirtualAlloc
DeleteFileA
Process32First
OpenProcess
Process32Next
CreateToolhelp32Snapshot
CloseHandle
CreateFileA
MoveFileExA
lstrcpynA
SetEndOfFile
SetFileTime
WriteFile
IsBadWritePtr
ReadFile
GetFileSizeEx
GetFileTime
user32
CharUpperA
advapi32
RegSetValueExA
RegOpenKeyExA
RegCreateKeyExA
CreateProcessWithLogonW
GetUserNameA
RegCloseKey
RegFlushKey
RegQueryValueExA
ole32
CoUninitialize
CoCreateInstance
CoInitializeEx
oleaut32
SysFreeString
SysAllocString
Sections
.text Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 135KB - Virtual size: 158KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ