Static task
static1
Behavioral task
behavioral1
Sample
ddf5f9b85244c9fe3dd16cef10255e80N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ddf5f9b85244c9fe3dd16cef10255e80N.exe
Resource
win10v2004-20240802-en
General
-
Target
ddf5f9b85244c9fe3dd16cef10255e80N
-
Size
97KB
-
MD5
ddf5f9b85244c9fe3dd16cef10255e80
-
SHA1
6555b65b0be1f0a82771e394bd0f70f5ef83284c
-
SHA256
dd1f557b2c32a98c857b6d29f652af6045f055dd5cc75c98e79bf2e88a748fff
-
SHA512
99aedf0ae3f12f88bb60a64d1c8b4da5ec85d2877ba7786e0dc6f70ea949240988378192ae271528983e6128f46f855cea87fc1f47f304cba1b2b4b611ec1fe9
-
SSDEEP
1536:S7bO3ZxsmNl+KldyaOUeCAc5xTVEKpeaR+Gkfg/oCgdz77HdOlG4/uuoFF1:2OMmNwKrrA4TV7peawGbURX4lGHuoFF1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ddf5f9b85244c9fe3dd16cef10255e80N
Files
-
ddf5f9b85244c9fe3dd16cef10255e80N.exe windows:4 windows x86 arch:x86
82e832e5393272a459a250927a9159b2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindClose
FindNextFileA
FindFirstFileA
Sleep
TerminateProcess
OpenProcess
GetFullPathNameA
GetVersionExA
FreeLibrary
GetTempFileNameA
GetSystemDirectoryA
LoadLibraryA
GlobalAlloc
GetDriveTypeA
GetLogicalDrives
GetTimeFormatA
GetDateFormatA
GetLocaleInfoA
GetModuleHandleA
CopyFileA
GetTickCount
CreateProcessA
CreateMutexA
GetLastError
DeleteFileA
CreateThread
SetThreadPriority
GetProcAddress
GlobalFree
SetEndOfFile
HeapFree
GetCurrentProcess
GetACP
GetCPInfo
CreateFileA
FlushFileBuffers
SetStdHandle
SetFilePointer
GetStringTypeW
GetStringTypeA
MultiByteToWideChar
RtlUnwind
GetOEMCP
GetFileType
CloseHandle
LCMapStringW
LCMapStringA
GetStartupInfoA
GetCommandLineA
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetModuleFileNameA
UnhandledExceptionFilter
WriteFile
HeapReAlloc
VirtualAlloc
VirtualFree
ExitProcess
GetStdHandle
SetHandleCount
HeapAlloc
HeapDestroy
GetVersion
ReadFile
HeapCreate
user32
MessageBoxA
DispatchMessageA
TranslateMessage
GetMessageA
SetTimer
EnumWindows
GetWindowThreadProcessId
GetWindowTextA
GetClassNameA
wsock32
ntohs
WSACleanup
recvfrom
recv
send
gethostbyname
inet_addr
htons
ioctlsocket
connect
closesocket
WSAStartup
socket
setsockopt
sendto
urlmon
URLDownloadToFileA
advapi32
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
CloseServiceHandle
EnumServicesStatusA
OpenSCManagerA
ControlService
OpenServiceA
DeleteService
RegDeleteKeyA
shell32
SHGetSpecialFolderLocation
SHGetPathFromIDListA
Sections
.text Size: 76KB - Virtual size: 75KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 515KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE