Static task
static1
Behavioral task
behavioral1
Sample
24c2b60c0ac34c1b84028a28baec5d70N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
24c2b60c0ac34c1b84028a28baec5d70N.exe
Resource
win10v2004-20240802-en
General
-
Target
24c2b60c0ac34c1b84028a28baec5d70N.exe
-
Size
7.2MB
-
MD5
24c2b60c0ac34c1b84028a28baec5d70
-
SHA1
b0e6630bcd94fcc6de37b034adf2e7515bb776c7
-
SHA256
455cd0db2de92ee348295780f8fc7a32a5406a5986a4d162761680f11b6346b1
-
SHA512
7e689b7ca0db405529951e4277a6c8463d356229d2a73d1674fdca585142b1d07a34528bb4a1b7a5ef3272b1d767d17a3065015e02cbc69b9eabcbcb7a282447
-
SSDEEP
49152:X2Xnu7QcKy/gBwdq1p//GSmgZIzdLTB1O7:X2XnyQch/+CSmgZIBL91O7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 24c2b60c0ac34c1b84028a28baec5d70N.exe
Files
-
24c2b60c0ac34c1b84028a28baec5d70N.exe.exe windows:6 windows x64 arch:x64
86fe4c638c6c7615be003d3db5693d07
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
GetTempFileNameW
LockFileEx
QueryDosDeviceW
RemoveDirectoryW
SetFileAttributesW
UnlockFile
SetFileApisToOEM
HeapCreate
GetCurrentProcess
GetExitCodeProcess
GetThreadPriorityBoost
TerminateThread
SetProcessShutdownParameters
GetProcessId
GetProcessPriorityBoost
GetThreadIOPendingFlag
SetProcessWorkingSetSize
QueryInformationJobObject
GetProcessIoCounters
SetThreadAffinityMask
SetFileShortNameW
WriteTapemark
SetTapeParameters
lstrcpynW
lstrcatW
CopyFileW
MoveFileWithProgressW
ReadDirectoryChangesW
FindNextVolumeMountPointW
GetDateFormatW
GetStringTypeExW
GetCPInfoExW
LCMapStringW
SetLocaleInfoW
IsValidLocale
GetGeoInfoW
GetSystemDefaultUILanguage
GetThreadLocale
SetThreadLocale
GetStringTypeA
ReadConsoleW
GenerateConsoleCtrlEvent
FlushConsoleInputBuffer
SetConsoleCP
SetConsoleTextAttribute
SetConsoleWindowInfo
WriteConsoleOutputCharacterW
WriteConsoleOutputW
GetConsoleTitleW
GetNumberOfConsoleMouseButtons
WriteConsoleW
CloseHandle
CreateFileW
SetFilePointerEx
GetConsoleMode
GetConsoleOutputCP
HeapReAlloc
HeapSize
GetProcessHeap
GetFileInformationByHandle
FlsSetValue
FlsGetValue
FlsAlloc
GetStringTypeW
GetFileType
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
WideCharToMultiByte
MultiByteToWideChar
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindClose
HeapFree
HeapAlloc
GetModuleHandleExW
TerminateProcess
ExitProcess
GetModuleFileNameW
WriteFile
GetStdHandle
RtlPcToFileHeader
RaiseException
EncodePointer
LoadLibraryExW
FreeLibrary
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
SetLastError
GetLastError
RtlUnwindEx
GetModuleHandleW
IsProcessorFeaturePresent
GetStartupInfoW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
GetDriveTypeW
FlushFileBuffers
FindNextFileW
FindFirstFileExW
FindFirstChangeNotificationW
GetCurrentDirectoryW
GetProcAddress
FlsFree
GetModuleHandleA
user32
IsMenu
IsChild
GetWindow
AttachThreadInput
GetKeyboardLayout
SetLayeredWindowAttributes
ShowOwnedPopups
MoveWindow
UserHandleGrantAccess
GetAltTabInfoW
GetAncestor
GetWindowInfo
InternalGetWindowText
EnumDisplaySettingsW
GetGuiResources
TileWindows
DlgDirSelectExW
DlgDirListW
MapDialogRect
LookupIconIdFromDirectory
CheckMenuRadioItem
SetWindowPos
DeregisterShellHookWindow
FindWindowW
SetProcessDefaultLayout
EqualRect
SetRectEmpty
GetCaretBlinkTime
CreateCaret
GetCursor
ShowCursor
SetMenuContextHelpId
SetWindowContextHelpId
AdjustWindowRectEx
GetClientRect
SetWindowTextW
EnumPropsW
SetPropW
ScrollWindow
RedrawWindow
InvalidateRgn
InvalidateRect
GetWindowRgnBox
GetUpdateRgn
DrawTextExW
DrawIcon
MenuItemFromPoint
GetMenuDefaultItem
GetMenuItemInfoW
SetMenuItemBitmaps
InsertMenuW
GetMenuItemID
DrawMenuBar
CopyAcceleratorTableW
KillTimer
MapVirtualKeyW
GetLastInputInfo
SendInput
ToAsciiEx
GetKeyboardType
GetKeyboardState
GetKeyState
GetKBCodePage
IsCharUpperW
CharNextExA
CharPrevW
CharLowerW
CharUpperBuffW
GetClipboardSequenceNumber
DefDlgProcW
GetDlgCtrlID
CreateDialogParamW
IsZoomed
BeginDeferWindowPos
DrawEdge
winspool.drv
FindClosePrinterChangeNotification
AbortPrinter
FindFirstPrinterChangeNotification
comdlg32
ReplaceTextW
ChooseColorW
GetFileTitleW
GetOpenFileNameW
ChooseFontW
CommDlgExtendedError
advapi32
DecryptFileW
shell32
DragQueryFileW
DragQueryPoint
DragFinish
DragAcceptFiles
ShellExecuteW
ShellAboutW
DuplicateIcon
ExtractAssociatedIconW
SHFileOperationW
ShellExecuteExW
SHQueryRecycleBinW
Shell_NotifyIconW
SHGetDiskFreeSpaceExA
SHGetDiskFreeSpaceExW
SHIsFileAvailableOffline
ord727
SHGetIconOverlayIndexW
ord18
ord19
ord25
ord155
ord24
ord21
ord23
ord27
ord190
SHBrowseForFolderW
SHChangeNotify
ord192
ord2
ord4
ord644
SHGetInstanceExplorer
ord88
ord47
ord75
ord176
SHGetSettings
SHBindToParent
ord716
userenv
GetUserProfileDirectoryW
GetProfilesDirectoryW
dxgi
CreateDXGIFactory
Sections
.text Size: 1.5MB - Virtual size: 1.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 164KB - Virtual size: 163KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 143KB - Virtual size: 155KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 95KB - Virtual size: 94KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ