Static task
static1
Behavioral task
behavioral1
Sample
10503d123e6b2c802343ba0fdb1b94b0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
10503d123e6b2c802343ba0fdb1b94b0N.exe
Resource
win10v2004-20240802-en
General
-
Target
10503d123e6b2c802343ba0fdb1b94b0N.exe
-
Size
900KB
-
MD5
10503d123e6b2c802343ba0fdb1b94b0
-
SHA1
6609ce562390eb23027289f303415dbe8364e00b
-
SHA256
a37711351e05f2704bd18f7cbf7681bba0cad57216c5918f021ea4e42bf4a298
-
SHA512
b2058233af1b14f657407e05616e054d2f0cf290c27da80026f85517c3bae78969cef5e2fd04cf866a439e961a6ce728e7f6a0ab022f3d1871f1cd426e2adff3
-
SSDEEP
24576:CsN34puonS0p+uCZwfL4y/EEwn+UxXQY0E6YO:hV4vxCZwfvEEwjhQZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 10503d123e6b2c802343ba0fdb1b94b0N.exe
Files
-
10503d123e6b2c802343ba0fdb1b94b0N.exe.exe windows:5 windows x86 arch:x86
74f1df54bc5fce60c884b2f848ab4431
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentProcess
OpenProcess
TerminateProcess
CreateDirectoryA
SetFileAttributesA
GetPrivateProfileStringA
GetLocalTime
WritePrivateProfileStringA
GetModuleFileNameA
WinExec
Sleep
MultiByteToWideChar
WideCharToMultiByte
GetACP
CreateMutexA
FindResourceA
FreeResource
LoadResource
SizeofResource
GetFileAttributesA
LockResource
Process32First
Process32Next
CreateToolhelp32Snapshot
GetFileType
FlushFileBuffers
WriteConsoleW
SetStdHandle
GetStringTypeW
GetConsoleMode
GetConsoleCP
HeapSize
RtlUnwind
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
LCMapStringW
IsValidCodePage
GetOEMCP
GetCPInfo
LoadLibraryW
InitializeCriticalSectionAndSpinCount
RaiseException
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
VirtualAlloc
VirtualFree
CloseHandle
GetLastError
CreateFileW
WriteFile
SetFilePointer
CreateFileA
HeapAlloc
InterlockedDecrement
SetLastError
InterlockedIncrement
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
IsProcessorFeaturePresent
GetModuleFileNameW
GetStdHandle
HeapCreate
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetStartupInfoW
HeapSetInformation
GetCommandLineA
HeapReAlloc
ExitProcess
GetModuleHandleW
GetProcAddress
EncodePointer
DecodePointer
GetSystemTimeAsFileTime
GetCurrentThreadId
HeapFree
user32
wvsprintfA
PostMessageA
advapi32
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegCloseKey
shell32
SHGetPathFromIDListA
SHCreateDirectoryExA
SHGetSpecialFolderLocation
ole32
CoUninitialize
CoInitialize
CoTaskMemFree
gdiplus
GdiplusShutdown
GdiplusStartup
shlwapi
PathRemoveFileSpecA
PathFileExistsA
PathStripPathA
psapi
EnumProcesses
GetModuleFileNameExA
EnumProcessModules
Sections
.text Size: 89KB - Virtual size: 88KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 22KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ