Static task
static1
Behavioral task
behavioral1
Sample
702bb182de65edc95e814ce230a49f20N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
702bb182de65edc95e814ce230a49f20N.exe
Resource
win10v2004-20240802-en
General
-
Target
702bb182de65edc95e814ce230a49f20N.exe
-
Size
4.1MB
-
MD5
702bb182de65edc95e814ce230a49f20
-
SHA1
6bcd77b75b3c72fceadd46cbb8bddef02a676bd5
-
SHA256
88553c1ea967b09585daf0f3eeed71c9cedb169df6eec9d8f711548b6e37fbe5
-
SHA512
2ed0a26108052cbd0bb07fc091c7e33659a76856d5fb43d7ea86d49487aa1c84d7b4b089fde4954dcd7180fff7e4c1944debb8d8b06bead7a24c0f1f86a64615
-
SSDEEP
98304:YUP3bp9vQ34LUG+ygKLoLC/4L81Aff2JLJZzDPtSTOvYy/:3P3bp9434oG+ygKLoLhoVxtukP/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 702bb182de65edc95e814ce230a49f20N.exe
Files
-
702bb182de65edc95e814ce230a49f20N.exe.exe windows:5 windows x86 arch:x86
10622746b67e8f4c4cd89dfdab69afd3
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_AGGRESIVE_WS_TRIM
Imports
setupapi
SetupDiGetDeviceRegistryPropertyW
SetupDiGetDeviceInterfaceDetailW
SetupDiGetClassDevsW
kernel32
GetFileTime
GetLastError
GetLocaleInfoW
GetLocalTime
GetLogicalDriveStringsW
GetModuleFileNameW
GetModuleHandleW
GetPrivateProfileIntW
GetProcAddress
GetProcessHeap
GetShortPathNameW
GetStartupInfoW
GetSystemDirectoryW
GetSystemInfo
GetSystemTime
GetSystemTimeAsFileTime
GetTempPathW
GetThreadContext
GetThreadPriority
GetUserDefaultLangID
GlobalAddAtomW
GlobalAlloc
GlobalDeleteAtom
GlobalFree
GlobalGetAtomNameW
GlobalHandle
GlobalLock
GlobalSize
GlobalUnlock
HeapAlloc
HeapDestroy
HeapFree
HeapReAlloc
HeapSize
IsProcessorFeaturePresent
LoadLibraryW
LoadResource
LocalAlloc
LocalFree
LockResource
lstrlenA
lstrlenW
MapViewOfFile
MoveFileW
MulDiv
MultiByteToWideChar
OutputDebugStringW
GetFileSize
RaiseException
ReadFile
RemoveDirectoryW
ResetEvent
ResumeThread
SetEndOfFile
SetErrorMode
SetEvent
SetFileAttributesW
SetFilePointer
SetLastError
SetThreadPriority
SetUnhandledExceptionFilter
SizeofResource
Sleep
SuspendThread
SystemTimeToFileTime
TerminateProcess
UnhandledExceptionFilter
UnmapViewOfFile
VirtualAlloc
VirtualProtect
VirtualQuery
WaitForSingleObjectEx
WideCharToMultiByte
WriteFile
LCMapStringA
GetStringTypeW
GetStringTypeA
GetOEMCP
GetACP
GetCPInfo
VirtualFree
HeapCreate
GetVersionExA
GetEnvironmentVariableA
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetFileAttributesW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetModuleFileNameA
ExitProcess
GetVersion
GetStartupInfoA
GetModuleHandleA
RtlUnwind
GetExitCodeThread
GetEnvironmentVariableW
GetDriveTypeW
GetDiskFreeSpaceW
GetCurrentThreadId
GetCurrentThread
GetCurrentProcessId
GetCurrentProcess
GetComputerNameA
FormatMessageW
FlushInstructionCache
FlushFileBuffers
FindResourceW
FindResourceExW
FindNextFileW
FindFirstFileW
FindClose
FileTimeToSystemTime
ExpandEnvironmentStringsW
DisconnectNamedPipe
DeviceIoControl
DeleteFileW
DeleteCriticalSection
CreateFileW
CreateFileMappingW
CreateProcessA
GetCommandLineA
InitializeCriticalSection
EnterCriticalSection
GetTickCount
LeaveCriticalSection
LoadLibraryA
GetTimeZoneInformation
GetSystemDefaultLCID
lstrcpyW
QueryPerformanceCounter
LCMapStringW
user32
PostMessageW
PeekMessageW
OpenClipboard
OffsetRect
OemToCharBuffA
MsgWaitForMultipleObjects
MessageBeep
MapWindowPoints
LoadIconW
LoadCursorW
KillTimer
RedrawWindow
IsRectEmpty
IsChild
InvalidateRect
IntersectRect
InsertMenuW
InflateRect
GetWindowThreadProcessId
RegisterWindowMessageW
RemoveMenu
GetSysColor
MessageBoxA
GetWindowRect
GetWindowLongW
SendMessageTimeoutW
SendMessageW
SetClipboardData
SetCursor
SetForegroundWindow
SetRectEmpty
SetTimer
ShowWindow
SystemParametersInfoW
TranslateMessage
UpdateWindow
IsWindowEnabled
GetSystemMenu
GetNextDlgTabItem
GetMenuItemInfoW
GetMenuItemID
GetMenuItemCount
GetKeyState
GetForegroundWindow
GetFocus
GetDlgItem
GetClassNameW
GetClassInfoW
FrameRect
FindWindowExW
EnableWindow
EmptyClipboard
DispatchMessageW
DestroyAcceleratorTable
DeleteMenu
DefWindowProcW
CreateMenu
CopyRect
CloseClipboard
GetClientRect
gdi32
SetBrushOrgEx
SetBkColor
SelectObject
GetStockObject
LineTo
MoveToEx
advapi32
AllocateAndInitializeSid
SetSecurityDescriptorOwner
SetSecurityDescriptorGroup
SetSecurityDescriptorDacl
CopySid
DuplicateToken
FreeSid
GetAclInformation
GetFileSecurityW
GetLengthSid
GetSecurityDescriptorControl
GetSecurityDescriptorDacl
GetSecurityDescriptorGroup
GetSecurityDescriptorLength
GetSecurityDescriptorOwner
GetSecurityDescriptorSacl
GetSidLengthRequired
GetSidSubAuthority
GetTokenInformation
ImpersonateSelf
InitializeAcl
InitializeSecurityDescriptor
IsValidSecurityDescriptor
IsValidSid
MakeAbsoluteSD
MakeSelfRelativeSD
MapGenericMask
OpenProcessToken
OpenThreadToken
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
RevertToSelf
shell32
StrCmpNIW
ole32
OleRun
oleaut32
VariantInit
shlwapi
PathSkipRootW
PathRemoveFileSpecW
PathIsURLW
PathIsUNCW
PathStripToRootW
PathIsUNCServerShareW
PathIsRootW
PathIsRelativeW
PathIsDirectoryW
PathFindFileNameW
PathIsUNCServerW
StrToIntW
Sections
.text Size: 2.4MB - Virtual size: 2.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 4.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 548KB - Virtual size: 547KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss8 Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE