Static task
static1
Behavioral task
behavioral1
Sample
de319493dbdd32ff547164e447aab28902222971911127e26c7abe04cc1dee3a.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
de319493dbdd32ff547164e447aab28902222971911127e26c7abe04cc1dee3a.exe
Resource
win10v2004-20240802-en
General
-
Target
de319493dbdd32ff547164e447aab28902222971911127e26c7abe04cc1dee3a
-
Size
9KB
-
MD5
6659fa37507f874cac88adca85ac3bde
-
SHA1
3c93730e0d3587d7b65b1855f9117fdbb4089de6
-
SHA256
de319493dbdd32ff547164e447aab28902222971911127e26c7abe04cc1dee3a
-
SHA512
dd94076041fd155ef23fb9edcdf6009565bd78a69dc260217cf08a6e4900400c0e37e450ac9318999188884ce0dedfbc1d75cff907ef2af8a764cf883cea59fc
-
SSDEEP
192:dsvA7rIGHJ/pJCQkJFbULvzECf5GdBs8TScWpJqog4W8:dsvAQeLJvkJZQb5hCvWnxg4W8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource de319493dbdd32ff547164e447aab28902222971911127e26c7abe04cc1dee3a
Files
-
de319493dbdd32ff547164e447aab28902222971911127e26c7abe04cc1dee3a.exe windows:5 windows x86 arch:x86
9353576e135c3ce2eaab7717cdd89833
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleW
lstrcpynW
GetLastError
LocalFree
lstrcpyW
lstrlenW
FormatMessageW
CreateProcessW
GetCommandLineW
CloseHandle
CreateFileW
GetSystemDirectoryW
GetProcAddress
GetModuleHandleA
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
msvcrt
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__initenv
exit
_cexit
_XcptFilter
_exit
_c_exit
??2@YAPAXI@Z
??3@YAXPAX@Z
__getmainargs
user32
WaitForInputIdle
LoadIconW
SendDlgItemMessageW
SetWindowTextW
EnableWindow
ShowWindow
SetWindowPos
GetDlgItem
EndDialog
wsprintfW
LoadStringW
DialogBoxParamW
GetWindowRect
ScreenToClient
GetWindowLongW
SetWindowLongW
DestroyWindow
Sections
.text Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 68B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 163KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE