Static task
static1
Behavioral task
behavioral1
Sample
50b4945478aef7db5e7cfd2681d855d0e984e3e219181edae95839353b778979.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
50b4945478aef7db5e7cfd2681d855d0e984e3e219181edae95839353b778979.exe
Resource
win10v2004-20240802-en
General
-
Target
50b4945478aef7db5e7cfd2681d855d0e984e3e219181edae95839353b778979
-
Size
868KB
-
MD5
4f1b748ea4b5b97209b85126eb89d1eb
-
SHA1
17fc1483d5aadfad83f16e5b2ec32af777db9121
-
SHA256
50b4945478aef7db5e7cfd2681d855d0e984e3e219181edae95839353b778979
-
SHA512
6aaa898098f7c88dc04d179cb1df3f16b109372ab6f627aef6b4f167ca0b62a924beb25ace44516d175b6b3346ada9e384f85d87e3513bc3d12d6ec75b8e2d18
-
SSDEEP
24576:/VtCLSEynMWnnlxZjXGUijM/OFa8j8jUduL0XHoIfdoPjKElxREqFvTTNH:NtaROMWnnlxZjWAOFa8j8jUduLkoIfdM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 50b4945478aef7db5e7cfd2681d855d0e984e3e219181edae95839353b778979
Files
-
50b4945478aef7db5e7cfd2681d855d0e984e3e219181edae95839353b778979.exe windows:4 windows x86 arch:x86
93071e6e8319e06e38df1eed0399ed7f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42
ord2878
ord4152
ord6055
ord4077
ord1776
ord4407
ord5237
ord2382
ord5163
ord6374
ord4353
ord5283
ord2649
ord1665
ord3798
ord4837
ord4436
ord2648
ord2055
ord6376
ord3749
ord5065
ord1727
ord2445
ord2124
ord5277
ord2982
ord3147
ord3259
ord4465
ord3136
ord3262
ord2985
ord3081
ord2976
ord3830
ord3831
ord3825
ord3079
ord4080
ord4627
ord4427
ord401
ord674
ord5254
ord3619
ord800
ord2243
ord540
ord879
ord537
ord882
ord4299
ord2614
ord4129
ord5572
ord2915
ord3874
ord6334
ord6215
ord2089
ord6199
ord2884
ord4216
ord1175
ord1907
ord3719
ord2411
ord2023
ord4218
ord2578
ord4398
ord3582
ord2575
ord4396
ord3574
ord5290
ord3402
ord4424
ord3721
ord5161
ord5162
ord5160
ord4905
ord4742
ord4976
ord4948
ord4358
ord5265
ord4377
ord4854
ord4998
ord2514
ord6052
ord4078
ord1775
ord5241
ord2385
ord5287
ord4835
ord4441
ord5261
ord2446
ord4425
ord795
ord609
ord616
ord768
ord567
ord489
ord793
ord2358
ord2297
ord2363
ord2302
ord4258
ord4710
ord755
ord470
ord2859
ord2864
ord2642
ord4478
ord3716
ord3610
ord790
ord656
ord2362
ord6111
ord4694
ord3089
ord641
ord2513
ord293
ord1908
ord4715
ord1690
ord2528
ord5288
ord4439
ord2054
ord4431
ord771
ord1008
ord497
ord4259
ord6197
ord6379
ord2379
ord4479
ord5873
ord4538
ord6880
ord4615
ord4612
ord4610
ord4274
ord6375
ord4486
ord2554
ord2512
ord5731
ord3922
ord1089
ord5199
ord2396
ord3346
ord5300
ord5302
ord2725
ord4079
ord4698
ord5307
ord5714
ord4622
ord3738
ord561
ord815
ord5301
ord5503
ord2635
ord2558
ord986
ord411
ord4159
ord6117
ord2621
ord1134
ord617
ord5214
ord296
ord4376
ord1146
ord5280
ord3597
ord324
ord4234
ord4476
ord5289
ord1825
ord4238
ord4696
ord3058
ord2879
ord6336
ord2510
ord2542
ord5243
ord5740
ord1746
ord5577
ord3172
ord5653
ord4420
ord4953
ord2399
ord4387
ord3454
ord3198
ord6080
ord4623
ord4426
ord713
ord652
ord414
ord338
ord4823
ord665
ord1979
ord353
ord922
ord924
ord858
ord603
ord273
ord4858
ord5645
ord5583
ord3127
ord3616
ord958
ord1200
ord2818
ord2652
ord1567
ord1669
ord268
ord2393
ord5651
ord5186
ord3499
ord860
ord350
ord354
ord2515
ord355
ord6175
ord4614
ord4613
ord1920
ord4262
ord4589
ord5076
ord4341
ord4349
ord4889
ord4531
ord4545
ord4543
ord4526
ord4529
ord4524
ord4963
ord4960
ord4108
ord5240
ord3748
ord1725
ord4432
ord784
ord517
ord5260
ord6194
ord5766
ord6131
ord6216
ord4723
ord613
ord2882
ord5859
ord289
ord1168
ord3571
ord640
ord2405
ord5785
ord6021
ord1640
ord323
ord5604
ord283
ord2535
ord3075
ord1859
ord4246
ord3869
ord2127
ord2391
ord5102
ord5105
ord4468
ord3350
ord975
ord2880
ord4153
ord2383
ord5284
ord4437
ord4428
ord3295
ord6154
ord2530
ord4366
ord4056
ord5471
ord4121
ord2389
ord5086
ord1710
ord1715
ord5234
ord6369
ord5279
ord5064
ord5248
ord2444
ord3730
ord807
ord796
ord554
ord529
ord402
ord2841
ord2109
ord2800
ord2120
ord2494
ord2627
ord2626
ord6000
ord2117
ord4163
ord6625
ord4457
ord5255
ord4362
ord816
ord6067
ord562
ord6069
ord2011
ord6209
ord2107
ord3398
ord3733
ord810
ord398
ord2301
ord2370
ord4000
ord3303
ord2365
ord3742
ord818
ord4275
ord2152
ord1233
ord1768
ord4268
ord2080
ord5882
ord5789
ord4454
ord1644
ord2863
ord6270
ord2438
ord3654
ord2584
ord4220
ord3706
ord6394
ord5450
ord6383
ord5440
ord5875
ord5787
ord3573
ord825
ord2801
ord2740
ord3663
ord1641
ord5788
ord3403
ord5472
ord976
ord5012
ord3351
ord4303
ord4467
ord5104
ord5100
ord3059
ord2390
ord2723
ord2101
ord5101
ord4245
ord3065
ord1858
ord6119
ord4297
ord4133
ord2414
ord3626
ord3693
ord6571
ord1871
ord4853
ord823
msvcrt
_acmdln
__CxxFrameHandler
_ftol
strncat
atoi
__dllonexit
_onexit
??1type_info@@UAE@XZ
_exit
_XcptFilter
exit
_controlfp
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
kernel32
GetModuleHandleA
GlobalAlloc
GlobalFree
RemoveDirectoryA
GetTempPathA
FindFirstFileA
FindClose
CreateDirectoryA
ExitProcess
LoadLibraryA
GetProcAddress
lstrcpyA
GetStartupInfoA
user32
CheckMenuItem
GetSubMenu
LoadMenuA
InflateRect
PtInRect
DrawFocusRect
GetWindowRect
SendMessageA
CopyRect
ReleaseDC
LoadBitmapA
GetSystemMetrics
SetTimer
LoadCursorA
SetCursor
ReleaseCapture
SetCapture
InvalidateRect
UpdateWindow
GetWindowDC
EnableWindow
IsWindowVisible
GetParent
GetDC
GetClientRect
SetRect
FillRect
gdi32
CreatePen
CreateSolidBrush
GetROP2
CreatePolygonRgn
PtInRegion
CreateBrushIndirect
SetPixel
Ellipse
CreateEllipticRgn
PolyBezier
Arc
RoundRect
CreateFontIndirectA
GetObjectA
LPtoDP
DPtoLP
GetTextMetricsA
SetBrushOrgEx
UnrealizeObject
GetPixel
GetBitmapBits
GdiFlush
PatBlt
GetMapMode
CreateCompatibleDC
CreateCompatibleBitmap
BitBlt
GetDeviceCaps
GetTextExtentPoint32A
EnumFontFamiliesA
Rectangle
shell32
ShellExecuteA
urlmon
URLDownloadToFileA
Sections
.text Size: 152KB - Virtual size: 148KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 156KB - Virtual size: 155KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 524KB - Virtual size: 522KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ