Static task
static1
Behavioral task
behavioral1
Sample
d1c6e3acfaa37f96540ea385d7e0e0572d44301192ed49a0d7fe5231be8c5f93.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
d1c6e3acfaa37f96540ea385d7e0e0572d44301192ed49a0d7fe5231be8c5f93.exe
Resource
win10v2004-20240802-en
General
-
Target
d1c6e3acfaa37f96540ea385d7e0e0572d44301192ed49a0d7fe5231be8c5f93
-
Size
148KB
-
MD5
47d61d4c3c9d07e9be72e99f2f307343
-
SHA1
8665fa73a1a80001e0b9408bbf2b2c0e529b7e68
-
SHA256
d1c6e3acfaa37f96540ea385d7e0e0572d44301192ed49a0d7fe5231be8c5f93
-
SHA512
9ae224ef7453e8f566114435b5649a5534206cd941f742d87c4fa9be6506c477ec75e08c7a3371f6a5d4e9800f715812af441c2f9b55e25d2d0099a91aa9bb4d
-
SSDEEP
1536:J3bGhkKbThd5y8rFYyRwuB78vjrXtSdIzVMEguRWLTRsM:RhilzwuBovjrXtSdIzK52M
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d1c6e3acfaa37f96540ea385d7e0e0572d44301192ed49a0d7fe5231be8c5f93
Files
-
d1c6e3acfaa37f96540ea385d7e0e0572d44301192ed49a0d7fe5231be8c5f93.exe windows:4 windows x86 arch:x86
a17b8ca50ce11c2be9172888aa10456a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WinExec
OpenEventA
CreateEventA
CreateToolhelp32Snapshot
Process32First
Process32Next
GetProcessHeap
GetModuleHandleA
ExitProcess
HeapAlloc
HeapReAlloc
HeapFree
IsBadReadPtr
GetModuleFileNameA
GetTickCount
FreeLibrary
GetProcAddress
LoadLibraryA
CloseHandle
FlushFileBuffers
SetStdHandle
GetStartupInfoA
GetCommandLineA
GetVersion
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
DeleteCriticalSection
GetCurrentThreadId
TlsSetValue
TlsAlloc
SetLastError
TlsGetValue
GetLastError
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
RtlUnwind
WriteFile
VirtualAlloc
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
RaiseException
GetCPInfo
GetACP
GetOEMCP
SetFilePointer
InterlockedDecrement
InterlockedIncrement
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
user32
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
wsprintfA
MessageBoxA
SetWindowPos
SetForegroundWindow
ShowWindow
GetClassNameA
GetWindowTextA
GetWindowThreadProcessId
IsWindowVisible
Sections
.text Size: 44KB - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 80KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
.data
-
.rdata
-
.rsrc/0/version.txt
-
.rsrc/1033/DIALOG/105
-
.rsrc/1033/DIALOG/106
-
.rsrc/1033/DIALOG/111
-
.rsrc/1033/GROUP_ICON/103
-
.rsrc/1033/ICON/4.ico
-
.rsrc/1033/MANIFEST/1.xml
-
.rsrc/2052/GROUP_ICON/129
-
.rsrc/2052/ICON/1.ico
-
.rsrc/2052/ICON/2.ico
-
.rsrc/2052/ICON/3.ico
-
.rsrc/2052/version.txt
-
.text