Static task
static1
Behavioral task
behavioral1
Sample
4d1585808c14d2ea40552f4a7139f1cde7e6e8c5efe7c633631776b6b58dd752.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
4d1585808c14d2ea40552f4a7139f1cde7e6e8c5efe7c633631776b6b58dd752.exe
Resource
win11-20240802-en
General
-
Target
4d1585808c14d2ea40552f4a7139f1cde7e6e8c5efe7c633631776b6b58dd752
-
Size
414KB
-
MD5
5606ff29754d556b0f766f096685dc25
-
SHA1
d391430514cead274d535c4a127c4d1e9cc1a58d
-
SHA256
4d1585808c14d2ea40552f4a7139f1cde7e6e8c5efe7c633631776b6b58dd752
-
SHA512
1882c4c8c00098214d2a3d453e0a0ac24506ef92a6c21aca4de95182b505d60e0e8f5049eee56a9cd85d703ded074f8f044f010ed05104f024f876f8f8259f82
-
SSDEEP
12288:6K3DXcgupVG5m+96IayOVQSRx3pRhfE4:rYnG5T96Ia96SfZLr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4d1585808c14d2ea40552f4a7139f1cde7e6e8c5efe7c633631776b6b58dd752
Files
-
4d1585808c14d2ea40552f4a7139f1cde7e6e8c5efe7c633631776b6b58dd752.exe windows:5 windows x86 arch:x86
e12f86c88c10a6fbfc55bcaf7131e9a4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetFilePointer
CommConfigDialogA
SetConsoleTextAttribute
SetEnvironmentVariableW
HeapFree
LockFile
GetModuleHandleW
GetTickCount
CreateNamedPipeW
GetConsoleAliasesLengthA
EnumTimeFormatsA
EnumTimeFormatsW
GlobalAlloc
LoadLibraryW
IsBadCodePtr
SetVolumeMountPointA
SetConsoleCP
GetConsoleAliasW
GetSystemDirectoryA
CreateActCtxA
ReplaceFileA
CreateJobObjectA
GetConsoleAliasesW
GetLastError
SetLastError
GetProcAddress
PeekConsoleInputW
GlobalFree
CreateFileA
InterlockedExchangeAdd
CreateFileMappingW
IsSystemResumeAutomatic
GetNumberFormatW
CreateEventW
QueryDosDeviceW
AddAtomA
OpenJobObjectW
FoldStringW
GetOEMCP
GetModuleHandleA
HeapSetInformation
EnumResourceNamesA
FatalAppExitA
SetProcessShutdownParameters
SetFileShortNameA
GetDiskFreeSpaceExW
GetCurrentProcessId
LCMapStringW
ReadFile
GetProcessHeap
SetEndOfFile
HeapSize
GetStringTypeW
LoadLibraryA
EnumResourceNamesW
MultiByteToWideChar
WriteConsoleW
FlushFileBuffers
SetStdHandle
CreateFileW
HeapAlloc
HeapReAlloc
GetCommandLineW
GetStartupInfoW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
DecodePointer
TerminateProcess
GetCurrentProcess
IsProcessorFeaturePresent
WideCharToMultiByte
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapCreate
ExitProcess
WriteFile
GetModuleFileNameW
RtlUnwind
CloseHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
IsValidCodePage
Sleep
RaiseException
user32
GetComboBoxInfo
SetClipboardViewer
GetCaretPos
CharUpperBuffW
ChangeMenuW
GetMenuState
GetDC
GetSysColorBrush
gdi32
GetCharABCWidthsI
shell32
FindExecutableA
ole32
StringFromIID
CoSuspendClassObjects
winhttp
WinHttpCheckPlatform
Sections
.text Size: 258KB - Virtual size: 257KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 95KB - Virtual size: 36.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bedozi Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.sixoluv Size: 1024B - Virtual size: 923B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 53KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ