Static task
static1
Behavioral task
behavioral1
Sample
535e5e44a3e26f6c6b1c317d50fd1af0N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
535e5e44a3e26f6c6b1c317d50fd1af0N.exe
Resource
win10v2004-20240802-en
General
-
Target
535e5e44a3e26f6c6b1c317d50fd1af0N
-
Size
97KB
-
MD5
535e5e44a3e26f6c6b1c317d50fd1af0
-
SHA1
c873d3729a2db49a9e831cd667a7996046b3accc
-
SHA256
b5af2289f4eca1f139c2c625f243e8d7b8b47aa067620b6cb01de057562096e7
-
SHA512
b9ad29bb2bd02a67fd8694e8fd65482e19892de0101e91516797c004d49ac5ce2f501bc54dd5a530763de0e42d15920548ce460398b682713bdabb9b612082af
-
SSDEEP
1536:S7bO3ZxsmNl+KldyaOUeCAc5xTVEKpeaR+Gkfg/oCgdz77HdOlG4/uuoFFv:2OMmNwKrrA4TV7peawGbURX4lGHuoFFv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 535e5e44a3e26f6c6b1c317d50fd1af0N
Files
-
535e5e44a3e26f6c6b1c317d50fd1af0N.exe windows:4 windows x86 arch:x86
82e832e5393272a459a250927a9159b2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindClose
FindNextFileA
FindFirstFileA
Sleep
TerminateProcess
OpenProcess
GetFullPathNameA
GetVersionExA
FreeLibrary
GetTempFileNameA
GetSystemDirectoryA
LoadLibraryA
GlobalAlloc
GetDriveTypeA
GetLogicalDrives
GetTimeFormatA
GetDateFormatA
GetLocaleInfoA
GetModuleHandleA
CopyFileA
GetTickCount
CreateProcessA
CreateMutexA
GetLastError
DeleteFileA
CreateThread
SetThreadPriority
GetProcAddress
GlobalFree
SetEndOfFile
HeapFree
GetCurrentProcess
GetACP
GetCPInfo
CreateFileA
FlushFileBuffers
SetStdHandle
SetFilePointer
GetStringTypeW
GetStringTypeA
MultiByteToWideChar
RtlUnwind
GetOEMCP
GetFileType
CloseHandle
LCMapStringW
LCMapStringA
GetStartupInfoA
GetCommandLineA
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetModuleFileNameA
UnhandledExceptionFilter
WriteFile
HeapReAlloc
VirtualAlloc
VirtualFree
ExitProcess
GetStdHandle
SetHandleCount
HeapAlloc
HeapDestroy
GetVersion
ReadFile
HeapCreate
user32
MessageBoxA
DispatchMessageA
TranslateMessage
GetMessageA
SetTimer
EnumWindows
GetWindowThreadProcessId
GetWindowTextA
GetClassNameA
wsock32
ntohs
WSACleanup
recvfrom
recv
send
gethostbyname
inet_addr
htons
ioctlsocket
connect
closesocket
WSAStartup
socket
setsockopt
sendto
urlmon
URLDownloadToFileA
advapi32
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
CloseServiceHandle
EnumServicesStatusA
OpenSCManagerA
ControlService
OpenServiceA
DeleteService
RegDeleteKeyA
shell32
SHGetSpecialFolderLocation
SHGetPathFromIDListA
Sections
.text Size: 76KB - Virtual size: 75KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 515KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE