Static task
static1
Behavioral task
behavioral1
Sample
55b674230ed3b764cfc3c76d8ee90f26ec89e9a6e87bcbec94765623263b131f.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
55b674230ed3b764cfc3c76d8ee90f26ec89e9a6e87bcbec94765623263b131f.exe
Resource
win10v2004-20240802-en
General
-
Target
55b674230ed3b764cfc3c76d8ee90f26ec89e9a6e87bcbec94765623263b131f
-
Size
2.7MB
-
MD5
16eba6bb15acd2667de2895b0b2c1e68
-
SHA1
3625beadfbf36381da0bc03da49c0d1802ac6bfa
-
SHA256
55b674230ed3b764cfc3c76d8ee90f26ec89e9a6e87bcbec94765623263b131f
-
SHA512
b93ec5852886df1befca1340362ca99958942faf442f6d5c52bddb255abcab8056f7b0c9b8c2dcc06f2e0057b6f27664f6186f8a279e9ee5c06d57efd511e488
-
SSDEEP
49152:i2l2y3d1L9iMxBCMVTKTUejmrD0ig7ZShHTrtVGODHuIaKPgD:i24yN1L8Mx1K3mrDMsPXHyC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 55b674230ed3b764cfc3c76d8ee90f26ec89e9a6e87bcbec94765623263b131f
Files
-
55b674230ed3b764cfc3c76d8ee90f26ec89e9a6e87bcbec94765623263b131f.exe windows:4 windows x86 arch:x86
6ed120191c2bd309d41a52414daa1e29
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
kernel32
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
oleaut32
SysFreeString
advapi32
RegQueryValueExA
user32
GetKeyboardType
msimg32
AlphaBlend
gdi32
WidenPath
version
VerQueryValueA
ole32
CreateStreamOnHGlobal
urlmon
CoInternetCreateZoneManager
wininet
HttpSendRequestExA
shell32
Shell_NotifyIconA
comctl32
_TrackMouseEvent
imm32
ImmSetCompositionWindow
winspool.drv
SetFormA
gdiplus
GdipDrawPath
shlwapi
PathCombineA
oleacc
LresultFromObject
winmm
timeGetTime
wsock32
WSACleanup
iphlpapi
GetAdaptersInfo
msvcrt
_gcvt
netapi32
Netbios
Sections
.text Size: 2.4MB - Virtual size: 10.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 319KB - Virtual size: 320KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE