Static task
static1
Behavioral task
behavioral1
Sample
4103c1c00e97e7b04b69dabdc89fc800N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4103c1c00e97e7b04b69dabdc89fc800N.exe
Resource
win10v2004-20240802-en
General
-
Target
4103c1c00e97e7b04b69dabdc89fc800N.exe
-
Size
966KB
-
MD5
4103c1c00e97e7b04b69dabdc89fc800
-
SHA1
9dba17d22881494a92b57a8eb1021862836eae26
-
SHA256
62fc0d7f505c15c070c36d623c6dcbfcb9fe7360a70426b6ba87439917c2de83
-
SHA512
132c101d98372aea90330fd06e603ec855a5408c33890624829124d030f45c3ac0cf308eb53d7365b27cdba022efa9dd47d984239ab4628aeb0b9f56e34129bf
-
SSDEEP
24576:o2nhiT/nV5EIuF79yrnnvh8NT+qY2IWmJrEH7/W:BgT/3Evyrnvh8NThY2IAW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4103c1c00e97e7b04b69dabdc89fc800N.exe
Files
-
4103c1c00e97e7b04b69dabdc89fc800N.exe.exe windows:6 windows x86 arch:x86
94a97300695bb79dfea1e7c8fe467ff5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetFilePointer
CloseHandle
LoadLibraryA
CreateProcessA
GetTempPathA
CreateFileA
GetModuleHandleA
FindClose
FindFirstFileA
FindNextFileA
Sleep
GetDriveTypeA
GetVolumeInformationA
FindFirstVolumeA
FindNextVolumeA
FindVolumeClose
GlobalMemoryStatus
GetCurrentProcess
GetSystemTime
SystemTimeToFileTime
GetVersionExA
FreeResource
LockResource
DeviceIoControl
LoadResource
SizeofResource
FindResourceA
DeleteFileA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
SetEvent
ResetEvent
WaitForSingleObjectEx
CreateEventW
GetModuleHandleW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
ReadFile
WriteFile
WaitForSingleObject
GetLastError
GetProcAddress
SetLastError
FreeLibrary
RtlUnwind
RaiseException
EncodePointer
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
CreateFileW
GetDriveTypeW
GetFileInformationByHandle
GetFileType
PeekNamedPipe
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
MultiByteToWideChar
SetFilePointerEx
GetDiskFreeSpaceW
GetFullPathNameW
GetFullPathNameA
FindFirstFileExW
FindNextFileW
WideCharToMultiByte
GetStdHandle
GetModuleFileNameA
ExitProcess
GetModuleHandleExW
GetCommandLineA
GetCommandLineW
GetACP
GetConsoleMode
ReadConsoleW
GetConsoleCP
SetEndOfFile
HeapFree
HeapAlloc
GetStringTypeW
CompareStringW
LCMapStringW
FlushFileBuffers
GetCurrentDirectoryW
SetStdHandle
MoveFileExW
HeapReAlloc
GetTimeZoneInformation
FindFirstFileExA
IsValidCodePage
GetOEMCP
GetCPInfo
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
GetProcessHeap
DeleteFileW
CreateDirectoryW
RemoveDirectoryW
HeapSize
WriteConsoleW
DecodePointer
advapi32
RegOpenKeyExA
RegCloseKey
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenProcessToken
RegQueryValueExA
Sections
.text Size: 664KB - Virtual size: 664KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 150KB - Virtual size: 150KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 47KB - Virtual size: 307KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ