Static task
static1
Behavioral task
behavioral1
Sample
13d9d34c484a5032acaa6e7f20469430N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
13d9d34c484a5032acaa6e7f20469430N.exe
Resource
win10v2004-20240802-en
General
-
Target
13d9d34c484a5032acaa6e7f20469430N.exe
-
Size
4.0MB
-
MD5
13d9d34c484a5032acaa6e7f20469430
-
SHA1
17943708d12fa010811e48f880810613951cf7c5
-
SHA256
dba81d965b9c8c2200e85493f5ed515be47310f9b8333fd77041f1012be0487b
-
SHA512
deefa137bada3c7eec01bbddccba8e25f4bee1981e8f10b3e81dd092f654bcda2fdf6ad198f1065146525c842a41fdd560b1c8eb5d0faa1188cc5ff1aa28e06c
-
SSDEEP
98304:P7BXaLQtX4cY8hbmle5JRJQRE4FdvaR1iwEUbt3T4u34MBreNEfTvSj/XOJ:vIc7bTQRp/aR1SUZ3h4CreNEbqU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 13d9d34c484a5032acaa6e7f20469430N.exe
Files
-
13d9d34c484a5032acaa6e7f20469430N.exe.exe windows:4 windows x86 arch:x86
ad64d722ea236f94e4b3fd938cd9ece3
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FlushFileBuffers
SetFileAttributesA
CompareFileTime
GetFileAttributesA
lstrcmpA
GetVolumeInformationA
lstrcpyA
SetFileTime
GetModuleFileNameA
GetCurrentThreadId
GetUserDefaultLangID
GetVersionExA
GetModuleHandleA
GetFileTime
GetEnvironmentVariableA
WriteFile
GetTempPathA
GetWindowsDirectoryA
GetSystemDirectoryA
SearchPathA
CreateDirectoryA
CompareStringA
IsDBCSLeadByte
DeleteFileA
LocalFree
FindResourceA
SizeofResource
LoadResource
LockResource
LocalAlloc
GetStartupInfoA
FreeResource
MultiByteToWideChar
lstrcpynA
lstrlenA
ReadFile
CloseHandle
SetLastError
CreateFileA
SetFilePointer
GetCurrentDirectoryA
GetLastError
user32
GetSystemMetrics
SetWindowTextA
SendDlgItemMessageA
SetFocus
KillTimer
UnhookWindowsHookEx
SetWindowsHookExA
GetClassInfoA
CharLowerA
SetTimer
IsIconic
DestroyIcon
MoveWindow
SendMessageA
DrawIcon
ReleaseDC
GetDC
GetDesktopWindow
EndPaint
GetDlgItem
EnableWindow
GetDlgItemTextA
PostMessageA
SetDlgItemTextA
PeekMessageA
IsDialogMessageA
BeginPaint
LoadIconA
TranslateMessage
DispatchMessageA
wsprintfA
CharNextA
CharPrevA
EndDialog
MessageBoxA
GetWindowLongA
CallNextHookEx
DialogBoxIndirectParamA
SystemParametersInfoA
GetWindowRect
CharUpperA
gdi32
GetMapMode
SetMapMode
GetStockObject
GetDeviceCaps
GetObjectA
comdlg32
GetFileTitleA
GetOpenFileNameA
advapi32
RegQueryValueExA
RegCreateKeyA
RegSetValueA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
RegOpenKeyExA
shell32
ShellExecuteA
crtdll
_fmode_dll
_global_unwind2
exit
_commode_dll
_local_unwind2
strchr
strrchr
atoi
_exit
_XcptFilter
_acmdln_dll
_initterm
__GetMainArgs
Sections
.text Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 181B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ