Static task
static1
Behavioral task
behavioral1
Sample
906b7c9a71afd2be917f0a649a969313b85a55bf1d589165f9868712ae1d5219.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
906b7c9a71afd2be917f0a649a969313b85a55bf1d589165f9868712ae1d5219.exe
Resource
win10v2004-20240802-en
General
-
Target
906b7c9a71afd2be917f0a649a969313b85a55bf1d589165f9868712ae1d5219
-
Size
2.1MB
-
MD5
d0cdabfb1834e4b116c47d6cb53898bf
-
SHA1
136c0837f973a400a99f3219a3f00181ed2afef9
-
SHA256
906b7c9a71afd2be917f0a649a969313b85a55bf1d589165f9868712ae1d5219
-
SHA512
a56b11385ab4585e769dfaf09262ad29d0eb378d649dd12175ddfed532a3dfded97ace64eccc106f631d7ed5151dc990cd1608e05f6b490193e613f9fa80fff9
-
SSDEEP
49152:rFimh5O6JHEiTfkmLENmkpLD5I7p0/NQ2SJ3ZFvBrWz0h:JX9Ek82ENVVDipkNQv3jvByg
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 906b7c9a71afd2be917f0a649a969313b85a55bf1d589165f9868712ae1d5219
Files
-
906b7c9a71afd2be917f0a649a969313b85a55bf1d589165f9868712ae1d5219.exe windows:5 windows x86 arch:x86
7a32a1d9ca6f189745c5a8e23e8a1868
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
user32
UnpackDDElParam
gdi32
SetViewportExtEx
msimg32
AlphaBlend
comdlg32
GetFileTitleW
winspool.drv
OpenPrinterW
advapi32
RegEnumKeyExW
shell32
DragQueryFileW
comctl32
InitCommonControlsEx
shlwapi
PathIsDirectoryW
ws2_32
htons
oledlg
OleUIBusyW
ole32
RevokeDragDrop
oleaut32
OleLoadPicture
gdiplus
GdipCloneImage
iphlpapi
GetAdaptersInfo
winmm
PlaySoundW
version
GetFileVersionInfoSizeW
imm32
ImmGetOpenStatus
wininet
HttpSendRequestW
Sections
.text Size: 2.0MB - Virtual size: 6.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 124KB - Virtual size: 124KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE