Static task
static1
Behavioral task
behavioral1
Sample
a4c609c0ca610f04f001a8285da68e30N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a4c609c0ca610f04f001a8285da68e30N.exe
Resource
win10v2004-20240802-en
General
-
Target
a4c609c0ca610f04f001a8285da68e30N.exe
-
Size
244KB
-
MD5
a4c609c0ca610f04f001a8285da68e30
-
SHA1
291ff9d5ac92ae3ce0a34489d216cd20c90fa533
-
SHA256
5b4e012d65082826f1d911d5d3180a9903c2811a4658842252e600aef56815e4
-
SHA512
5d6d55a3d5493883a9bc96e1c192e72b0509b1956f5ea16af332a9df07b0cb7c43a65d8f2042f4b009e39b83f0a326228df0711c86a0833f9493cafc94ef513a
-
SSDEEP
6144:zEXlSylvFuWaS54hIAv/QhuA7HY8pPZ0FP6BzxM5EmX:UAylvv5YRwh9HYd61xhmX
Malware Config
Signatures
Files
-
a4c609c0ca610f04f001a8285da68e30N.exe.exe windows:4 windows x86 arch:x86
25724a12bec6f765c371201f99ac92be
Code Sign
a0:21:84:d7:75:ec:3c:ea:aa:63:97:b4:86:40:49:d6:b8:9e:37:c4Signer
Actual PE Digesta0:21:84:d7:75:ec:3c:ea:aa:63:97:b4:86:40:49:d6:b8:9e:37:c4Digest Algorithmsha1PE Digest MatchesfalseHeaders
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetNumberFormatA
SetEvent
FindResourceA
GetExpandedNameW
GetFileTime
RaiseException
GetTempPathW
FileTimeToDosDateTime
GetStringTypeA
SearchPathW
GetTempPathA
GetFileAttributesW
SetCalendarInfoA
GetVersion
CreateMailslotW
lstrlenA
EnumTimeFormatsW
VirtualAlloc
EnumCalendarInfoA
GetEnvironmentStringsW
SetLastError
GetCurrentProcess
ConnectNamedPipe
GetModuleFileNameW
lstrcpynA
GetCurrentThread
WaitForSingleObject
GlobalGetAtomNameA
OpenFile
GetTempFileNameW
ReplaceFileA
OpenMutexW
CreateDirectoryA
AddAtomW
GetCurrentProcessId
GetStringTypeW
OpenMutexA
GetLongPathNameA
CreateFiber
GetCurrentDirectoryW
CreateEventA
SystemTimeToFileTime
GlobalDeleteAtom
InitializeCriticalSection
SuspendThread
GetDiskFreeSpaceW
GetCurrentThreadId
CreateThread
SetComputerNameW
IsBadStringPtrA
user32
InsertMenuItemW
ChildWindowFromPoint
GetMessageA
GetWindowRgn
DrawTextW
GetDC
IsDlgButtonChecked
GetClassInfoA
LoadCursorA
CreateDialogParamW
CheckRadioButton
SetCursorPos
LoadImageA
SetWindowLongA
LoadMenuIndirectA
SetCapture
CreateMenu
EnableMenuItem
CharNextW
CheckDlgButton
OpenWindowStationA
gdi32
GetColorSpace
DeleteColorSpace
GetKerningPairsA
CreateMetaFileA
ColorCorrectPalette
GetCharWidthI
GetTextExtentExPointW
GetDCOrgEx
EnumFontFamiliesExW
GetClipRgn
GetCharWidth32W
CombineRgn
GetEnhMetaFileDescriptionA
SelectObject
UpdateICMRegKeyA
GetClipBox
CreateDIBPatternBrushPt
GetTextMetricsW
advapi32
IsValidAcl
RegDeleteValueW
RegRestoreKeyA
RegOpenKeyW
ole32
CoGetPSClsid
CoDeactivateObject
OleCreateEx
CLSIDFromProgID
CoGetCallerTID
OleUninitialize
CreateFileMoniker
Sections
.<9;kn% Size: 10KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.E Size: 1KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.0<+' Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.< Size: 1024B - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.FpFJb Size: 3KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.(c1$7 Size: 1024B - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 212KB - Virtual size: 211KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ