Static task
static1
Behavioral task
behavioral1
Sample
6832586acd1da6ede5413c0bed4caeb0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6832586acd1da6ede5413c0bed4caeb0N.exe
Resource
win10v2004-20240802-en
General
-
Target
6832586acd1da6ede5413c0bed4caeb0N.exe
-
Size
1.3MB
-
MD5
6832586acd1da6ede5413c0bed4caeb0
-
SHA1
02dbb8891fbcb526f9c9917971723d0160ac6133
-
SHA256
e3faf5766a50e83007b3eb92de08915201519a943eb48f77ff65e3d9a7b17561
-
SHA512
c185ff18aaab866e084516e8ca8f21627c6e5bda8b80d683fc21c695baf04855b96ac9005d734050a4e4bdbf3a7bf2306eeb5fe1b6b19725ea4cf44f779c9a45
-
SSDEEP
24576:msFO6shm19Bc+5mpzQ5ZXupnUMafT8S4iFxJrhtmvLRPrw:msrsOBr595Yppag4rivLRPk
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6832586acd1da6ede5413c0bed4caeb0N.exe
Files
-
6832586acd1da6ede5413c0bed4caeb0N.exe.exe windows:5 windows x86 arch:x86
429f90c18e865ea02deb386d4b27aec3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindFirstFileExW
DeleteFileW
MoveFileExW
FindNextFileW
FindClose
RemoveDirectoryW
lstrcmpiW
CopyFileW
CreateToolhelp32Snapshot
Process32FirstW
GetCurrentProcess
OpenProcess
SetLastError
TerminateProcess
Process32NextW
GetLastError
LocalFree
GetTempPathW
GetTempFileNameW
WriteFile
GetSystemDirectoryW
LocalAlloc
WideCharToMultiByte
MultiByteToWideChar
SetEndOfFile
LCMapStringW
CloseHandle
HeapSize
GetStringTypeW
OutputDebugStringW
HeapReAlloc
FindResourceW
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FlushFileBuffers
WriteConsoleW
SetStdHandle
SetFilePointerEx
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCurrentProcessId
QueryPerformanceCounter
DeleteCriticalSection
GetFileType
GetStdHandle
GetStartupInfoW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetModuleHandleExW
CreateProcessW
InterlockedDecrement
InterlockedIncrement
FreeResource
SizeofResource
LockResource
LoadResource
GetSystemTime
GetPrivateProfileStringW
lstrlenW
CreateFileW
lstrcpyW
WritePrivateProfileStringW
GetExitCodeThread
WaitForSingleObject
Sleep
CreateDirectoryW
GetVersionExW
LoadLibraryW
FreeLibrary
lstrcpynW
GetModuleHandleW
GetModuleFileNameW
OpenMutexW
lstrcmpW
ExitProcess
GetConsoleMode
GetConsoleCP
RtlUnwind
GetProcessHeap
RaiseException
IsProcessorFeaturePresent
IsDebuggerPresent
LeaveCriticalSection
EnterCriticalSection
GetCommandLineW
lstrcatW
GetSystemTimeAsFileTime
HeapAlloc
LoadLibraryExW
GetProcAddress
ExitThread
GetCurrentThreadId
CreateThread
DecodePointer
EncodePointer
HeapFree
ReadFile
SetFileAttributesW
AreFileApisANSI
CreateFileA
SetFilePointer
ReadConsoleW
user32
PostMessageW
LoadBitmapW
GetClientRect
CreateWindowExW
SendMessageW
SetWindowTextW
FillRect
DrawIcon
GetWindowTextW
GetSysColor
GetWindowRect
GetSystemMetrics
LoadIconW
SetWindowPos
LoadStringW
SetWindowTextA
GetSysColorBrush
PostQuitMessage
MessageBoxW
SetTimer
KillTimer
GetDesktopWindow
DispatchMessageW
TranslateMessage
wsprintfW
GetMessageW
GetFocus
FindWindowExW
GetParent
GetClassNameW
SetFocus
EnableWindow
LoadCursorW
SetWindowLongW
EndPaint
BeginPaint
DefWindowProcW
GetWindowLongW
RegisterClassExW
UpdateWindow
ShowWindow
gdi32
GetStockObject
GetObjectW
DeleteDC
StretchBlt
SelectObject
CreateCompatibleDC
CreateFontIndirectW
advapi32
RegSetValueExW
GetUserNameW
FreeSid
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
SetEntriesInAclW
AllocateAndInitializeSid
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
RegCreateKeyExW
shell32
SHGetFileInfoW
SHGetDesktopFolder
ExtractIconW
SHGetMalloc
SHGetPathFromIDListW
SHBrowseForFolderW
SHGetSpecialFolderPathW
ole32
CoUninitialize
CoCreateInstance
CoInitialize
comctl32
InitCommonControlsEx
version
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
shlwapi
StrRChrIW
StrStrIW
PathFileExistsW
StrStrIA
Sections
.text Size: 127KB - Virtual size: 126KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 14KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ