Static task
static1
Behavioral task
behavioral1
Sample
2040977b1a53afc1843f82f098762410N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2040977b1a53afc1843f82f098762410N.exe
Resource
win10v2004-20240802-en
General
-
Target
2040977b1a53afc1843f82f098762410N.exe
-
Size
383KB
-
MD5
2040977b1a53afc1843f82f098762410
-
SHA1
d31950d9d73e00ac0920b32d0163ed31bac202b5
-
SHA256
4a01ae3a1e046e0ff8fe406c7408b8eae3fdbfd6b97164c3d78a4a242ead836d
-
SHA512
531fbab6c29bad8a2bea17d2ec14e73e85194f478c01911c26bb9a7f1907fe2a7645353613c4dc232f3f2a2baec742c1041cf2d4b0990c4362a164a1e6c3a6f8
-
SSDEEP
6144:WN/Bk4taMGQjeLTaooRPpUXVfzKql171uSFFK1Ap49TJniOl2z:WN/BkiaMGQCPKRy91uu63TsH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2040977b1a53afc1843f82f098762410N.exe
Files
-
2040977b1a53afc1843f82f098762410N.exe.exe windows:5 windows x86 arch:x86
4b14e6b03c3213fdd964224ec31ee9be
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CopyFileW
MultiByteToWideChar
GetLastError
WriteFile
ReadFile
SetFilePointer
CreateFileW
TerminateThread
CreateProcessW
lstrcpynA
HeapAlloc
HeapFree
GetProcessHeap
TerminateProcess
DeviceIoControl
FindClose
GetLocalTime
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleW
ExpandEnvironmentStringsW
SetCurrentDirectoryW
CreateDirectoryW
SetFileAttributesW
FindNextFileW
CopyFileExW
WideCharToMultiByte
CreateToolhelp32Snapshot
Process32FirstW
FindFirstFileW
SetEndOfFile
ReadConsoleW
WriteConsoleW
SetStdHandle
LoadLibraryW
LoadLibraryExW
OutputDebugStringW
DeleteFileW
GetTempPathW
WinExec
CloseHandle
Sleep
WaitForSingleObject
InitializeCriticalSectionAndSpinCount
ResumeThread
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
SetFilePointerEx
GetFileType
GetConsoleMode
GetConsoleCP
FlushFileBuffers
GetCurrentThreadId
GetOEMCP
GetACP
IsValidCodePage
HeapSize
AreFileApisANSI
GetModuleHandleExW
ExitProcess
GetStdHandle
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
GetProcAddress
GetStartupInfoW
TlsFree
Process32NextW
CreateThread
InterlockedIncrement
InterlockedDecrement
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
EncodePointer
DecodePointer
GetStringTypeW
RaiseException
RtlUnwind
HeapReAlloc
IsDebuggerPresent
IsProcessorFeaturePresent
GetCommandLineA
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
GetCurrentProcess
TlsAlloc
TlsGetValue
TlsSetValue
user32
LoadStringW
wvsprintfW
FindWindowExW
FindWindowW
PostMessageW
wsprintfW
PostThreadMessageW
shell32
SHGetSpecialFolderPathW
SHCreateDirectoryExW
SHFileOperationW
ole32
CoCreateInstance
CoUninitialize
CoInitialize
ws2_32
recv
gethostbyname
htons
connect
closesocket
socket
send
WSAStartup
shlwapi
PathFileExistsW
wininet
InternetSetFilePointer
InternetCloseHandle
InternetOpenW
InternetReadFile
InternetOpenUrlW
iphlpapi
GetAdaptersInfo
Sections
.text Size: 270KB - Virtual size: 270KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 50KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 50KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ