Static task
static1
Behavioral task
behavioral1
Sample
96dd212da728109baa4d5478bbc74f685bffaae06bfd1be14841f9df1bb07fe6.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
96dd212da728109baa4d5478bbc74f685bffaae06bfd1be14841f9df1bb07fe6.exe
Resource
win10v2004-20240802-en
General
-
Target
96dd212da728109baa4d5478bbc74f685bffaae06bfd1be14841f9df1bb07fe6
-
Size
429KB
-
MD5
b10a2be90e020a04d9e1e37f6ff1a106
-
SHA1
d097fd883a51dc2274d23472b885b0dd441ce228
-
SHA256
96dd212da728109baa4d5478bbc74f685bffaae06bfd1be14841f9df1bb07fe6
-
SHA512
243b7d1c97f35ab4c4491b8972313f2e252de4eab2b231cbf3a7b0169a435a4dec3de47ccd564644ed958ffb78af1b6d2972e20084515953a470311b80609aa8
-
SSDEEP
1536:CIyxlXxlgA0TrkXQqmVzs7EgIteMtuPAuAcAb9iA:CJ7lgiMQ7IteMt
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 96dd212da728109baa4d5478bbc74f685bffaae06bfd1be14841f9df1bb07fe6
Files
-
96dd212da728109baa4d5478bbc74f685bffaae06bfd1be14841f9df1bb07fe6.exe windows:4 windows x86 arch:x86
bd51d8bbfc7272be5b9f12eaf87c37bd
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetEvent
WaitForSingleObject
CreateEventW
GetFileSize
CreateFileW
SetFilePointer
DeleteFileW
SetFileAttributesW
FindNextFileW
FileTimeToSystemTime
FileTimeToLocalFileTime
FindFirstFileW
GetTickCount
GetVersionExW
CreateFileA
WinExec
CopyFileA
GetModuleFileNameA
SetEnvironmentVariableA
CompareStringW
CompareStringA
TerminateProcess
LCMapStringW
LCMapStringA
SetStdHandle
FlushFileBuffers
LoadLibraryA
GetProcAddress
GetACP
GetCPInfo
GetStringTypeW
GetStringTypeA
VirtualAlloc
InterlockedIncrement
InterlockedDecrement
VirtualFree
HeapCreate
HeapDestroy
GetVersionExA
GetEnvironmentVariableA
GetFileType
CreateToolhelp32Snapshot
Process32FirstW
OpenProcess
Process32NextW
CreatePipe
GetStartupInfoW
GetWindowsDirectoryW
CreateProcessW
GetOEMCP
CreateThread
WriteFile
CloseHandle
ReadFile
PeekNamedPipe
MultiByteToWideChar
GetDriveTypeW
Sleep
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
DeleteCriticalSection
InitializeCriticalSection
HeapFree
HeapSize
HeapAlloc
HeapReAlloc
GetLastError
TlsGetValue
SetLastError
GetSystemTimeAsFileTime
ExitProcess
GetCurrentProcess
RtlUnwind
GetTimeZoneInformation
GetSystemTime
GetLocalTime
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
EnterCriticalSection
LeaveCriticalSection
GetCurrentThreadId
TlsSetValue
TlsAlloc
user32
DispatchMessageW
TranslateMessage
TranslateAcceleratorW
LoadAcceleratorsW
wsprintfW
RegisterClassExW
LoadCursorW
LoadIconW
PostThreadMessageW
UpdateWindow
GetMessageW
KillTimer
LoadBitmapW
LoadStringW
EndDialog
BeginPaint
EndPaint
PostQuitMessage
DefWindowProcW
DestroyWindow
DialogBoxParamW
InvalidateRect
CreateWindowExW
GetSystemMetrics
MoveWindow
GetDC
SetTimer
gdi32
CreateCompatibleDC
CreateCompatibleBitmap
StretchBlt
BitBlt
DeleteObject
SetBkColor
SetTextColor
TextOutA
CreateFontA
SelectObject
Rectangle
GetStockObject
DeleteDC
advapi32
RegSetValueExA
RegCloseKey
RegOpenKeyExW
shell32
ShellExecuteW
SHGetFileInfoW
psapi
GetModuleFileNameExW
ws2_32
recv
send
closesocket
shutdown
connect
gethostbyname
htons
socket
accept
listen
bind
inet_ntoa
gethostname
WSAStartup
Sections
.text Size: 42KB - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 47KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.shell Size: 320KB - Virtual size: 320KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ