Static task
static1
Behavioral task
behavioral1
Sample
d4306033b1d8a85e64aba3e107ce93e27bf748f855343c57c19f8694d490c2f0.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
d4306033b1d8a85e64aba3e107ce93e27bf748f855343c57c19f8694d490c2f0.exe
Resource
win10v2004-20240802-en
General
-
Target
d4306033b1d8a85e64aba3e107ce93e27bf748f855343c57c19f8694d490c2f0
-
Size
3.1MB
-
MD5
e4700a3c7188c138f64676614d42d28b
-
SHA1
f6e3c6a03b9c24ceb753350c86e0ae2ad8a3a457
-
SHA256
d4306033b1d8a85e64aba3e107ce93e27bf748f855343c57c19f8694d490c2f0
-
SHA512
20a7a1ae81359a61a219a80eaa3a490acd554ae7513dc49c44fd61e4bcaabd71b0c99f6165aa5c76757cc7d39692ed2947643560e26e0c0cc960dc8d818cff0e
-
SSDEEP
49152:3qCnweLJxaY6TEgb87LYI5YxSHFMDK0XJpBER2d:6CnweLJxaALY4+HXH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d4306033b1d8a85e64aba3e107ce93e27bf748f855343c57c19f8694d490c2f0
Files
-
d4306033b1d8a85e64aba3e107ce93e27bf748f855343c57c19f8694d490c2f0.exe windows:6 windows x86 arch:x86
9d99e19f206e51befe07e30135f46a3f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
MultiByteToWideChar
GetLastError
GetFileAttributesExW
GlobalFlags
DeleteFileW
GetSystemInfo
GetCurrentDirectoryW
WideCharToMultiByte
IsBadReadPtr
VirtualQuery
HeapFree
HeapReAlloc
HeapAlloc
GetProcessHeap
SetEvent
ResetEvent
FileTimeToSystemTime
GetSystemTimeAsFileTime
GetEnvironmentVariableW
RaiseException
VirtualProtect
VirtualFree
VirtualAlloc
OpenFileMappingW
UnmapViewOfFile
CreateFileMappingW
MapViewOfFile
CreateProcessW
CreatePipe
WriteConsoleW
HeapSize
SetEndOfFile
GetStringTypeW
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
SetStdHandle
CreateEventW
FlushFileBuffers
GetTimeZoneInformation
LCMapStringW
CompareStringW
DecodePointer
GetConsoleOutputCP
ReadConsoleW
GetConsoleMode
FreeLibraryAndExitThread
ExitThread
SystemTimeToTzSpecificLocalTime
GetFileInformationByHandle
GetDriveTypeW
GetCommandLineA
GetModuleHandleExW
LoadLibraryExW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
EncodePointer
RtlUnwind
InitializeSListHead
GetStartupInfoW
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
GetFileSizeEx
CreateFileA
VerifyVersionInfoA
FormatMessageW
WaitForMultipleObjects
GetFileType
GetStdHandle
GetEnvironmentVariableA
WaitForSingleObjectEx
MoveFileExA
GetModuleHandleA
GetSystemDirectoryA
QueryPerformanceFrequency
SleepEx
InitializeCriticalSectionEx
QueryPerformanceCounter
GetFileAttributesW
FindClose
GetCurrentProcess
FindNextFileW
GetCommandLineW
SetLastError
GetTickCount
FindResourceW
LoadResource
LockResource
FreeResource
GetCurrentThreadId
SizeofResource
MulDiv
GlobalUnlock
GlobalLock
ExitProcess
OpenEventW
SetWaitableTimer
CreateWaitableTimerW
IsWow64Process
LoadLibraryA
CreateThread
FreeLibrary
LoadLibraryW
TerminateProcess
OpenProcess
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
GetCurrentProcessId
GetProcAddress
GetModuleHandleW
GlobalAlloc
GlobalFree
CreateFileW
LeaveCriticalSection
IsDebuggerPresent
WriteFile
SetFilePointerEx
GetModuleFileNameW
TryEnterCriticalSection
EnterCriticalSection
InitializeCriticalSection
DeleteCriticalSection
Sleep
GetExitCodeProcess
ReadFile
PeekNamedPipe
CreateDirectoryW
CloseHandle
GetFullPathNameW
user32
KillTimer
MsgWaitForMultipleObjects
PeekMessageW
TranslateMessage
SetTimer
GetPropW
GetParent
WaitForInputIdle
SendMessageTimeoutW
GetWindowTextLengthW
GetWindowTextW
DispatchMessageW
GetDesktopWindow
LoadCursorW
LoadIconW
SetPropW
RegisterClassW
GetClassInfoW
LoadStringW
SendMessageW
CreateWindowExW
DestroyWindow
DefWindowProcW
GetWindowLongW
EnumWindows
MonitorFromWindow
wsprintfW
MessageBoxA
GetDC
ReleaseDC
GetMessageW
MessageBoxW
GetAsyncKeyState
GetWindow
GetTopWindow
LoadImageW
RemovePropW
IsWindowVisible
GetWindowThreadProcessId
GetCursorPos
WindowFromPoint
gdi32
SelectObject
CreateDIBSection
SetDIBColorTable
CreateCompatibleDC
GetStockObject
GetDeviceCaps
DeleteDC
GetObjectW
DeleteObject
advapi32
CryptImportKey
CryptGetHashParam
CryptAcquireContextA
CryptCreateHash
RegCloseKey
RegQueryValueW
RegOpenKeyExW
CryptDecrypt
CryptReleaseContext
CryptDestroyKey
CryptEncrypt
CryptDestroyHash
CryptDeriveKey
CryptHashData
CryptGenRandom
shell32
SHGetSpecialFolderPathW
ShellExecuteW
ole32
PropVariantClear
CoTaskMemAlloc
CoCreateGuid
CoCreateInstance
CoUninitialize
CreateStreamOnHGlobal
CoInitializeEx
comctl32
ImageList_Create
ImageList_AddMasked
ImageList_Destroy
crypt32
CertCloseStore
CertEnumCertificatesInStore
CertFindCertificateInStore
CertFreeCertificateContext
CryptStringToBinaryA
PFXImportCertStore
CryptDecodeObjectEx
CertAddCertificateContextToStore
CertFindExtension
CertGetNameStringA
CryptQueryObject
CertCreateCertificateChainEngine
CertFreeCertificateChainEngine
CertGetCertificateChain
CertFreeCertificateChain
CertOpenStore
iphlpapi
GetExtendedTcpTable
ntdll
VerSetConditionMask
psapi
GetModuleFileNameExW
EnumProcesses
shlwapi
PathFileExistsW
wldap32
ord46
ord211
ord60
ord45
ord50
ord41
ord22
ord26
ord27
ord32
ord33
ord35
ord79
ord30
ord200
ord301
ord143
ws2_32
htons
getsockopt
getsockname
getpeername
connect
bind
WSAIoctl
select
__WSAFDIsSet
inet_pton
WSAGetLastError
WSACleanup
WSAStartup
ntohs
setsockopt
accept
closesocket
recv
send
socket
ntohl
htonl
listen
ioctlsocket
getaddrinfo
freeaddrinfo
WSACreateEvent
WSAEnumNetworkEvents
WSAEventSelect
sendto
recvfrom
WSASetLastError
gethostname
WSACloseEvent
gdiplus
GdiplusShutdown
GdipGetImageHeight
GdipGetImagePaletteSize
GdipCloneImage
GdipBitmapUnlockBits
GdipCreateBitmapFromStream
GdipAlloc
GdipDrawImageRectI
GdipDisposeImage
GdipGetImagePixelFormat
GdipFree
GdipBitmapLockBits
GdipGetImageGraphicsContext
GdipDeleteGraphics
GdipSetCompositingMode
GdipGetImageWidth
GdipCreateBitmapFromFile
GdipCreateBitmapFromScan0
GdiplusStartup
GdipGetImagePalette
Sections
.text Size: 836KB - Virtual size: 835KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2.1MB - Virtual size: 2.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 105KB - Virtual size: 105KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 51KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ