Static task
static1
Behavioral task
behavioral1
Sample
d4d376d73222413855687818db8edcd0N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d4d376d73222413855687818db8edcd0N.exe
Resource
win10v2004-20240802-en
General
-
Target
d4d376d73222413855687818db8edcd0N
-
Size
701KB
-
MD5
d4d376d73222413855687818db8edcd0
-
SHA1
1437aa10a763f799d374534dd522d3501c711205
-
SHA256
5be58551844b442f06f38835140d5f6d474060346c236a8ee950985963269604
-
SHA512
fecca4a05896bf5b0d67ea60166426db895c4a6c7811c37ef590f1eacdcf6a434893052614aa4ab242290e483ef0916eae44a2ae57745cc101432bed925da5f7
-
SSDEEP
12288:rOB/jTIILz5yf5tZ+ZnphLSNo8Ss3vFhbS9Tvuu4PAl1i4Jf3iMMwsmFkTK7hKEx:ryotZ+pph+No8SYT+9TGjPy1xxiDrO5t
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d4d376d73222413855687818db8edcd0N
Files
-
d4d376d73222413855687818db8edcd0N.exe windows:5 windows x86 arch:x86
0a926635ace36954c8e407acc954b815
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
RemoveDirectoryA
GetTempPathA
CloseHandle
CreateFileA
WriteFile
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetCurrentThreadId
WaitForSingleObject
FreeLibrary
CreateDirectoryA
VirtualProtect
GetProcAddress
LoadLibraryA
VirtualAlloc
GetCommandLineW
GetTickCount
CreateEventA
Sleep
SetEvent
GetCurrentProcessId
SetCurrentDirectoryA
GetModuleFileNameW
VirtualFree
SizeofResource
LoadResource
GetModuleHandleA
DeleteCriticalSection
FindResourceW
GetLastError
HeapFree
ReadFile
GetCommandLineA
EncodePointer
DecodePointer
CreateThread
ExitThread
LoadLibraryExW
GetSystemTimeAsFileTime
HeapAlloc
GetProcessHeap
IsDebuggerPresent
IsProcessorFeaturePresent
SetFilePointer
MultiByteToWideChar
GetConsoleMode
ReadConsoleW
SetFilePointerEx
GetStdHandle
GetFileType
InitializeCriticalSectionAndSpinCount
GetStartupInfoW
RtlUnwind
SetLastError
InterlockedIncrement
InterlockedDecrement
ExitProcess
GetModuleHandleExW
AreFileApisANSI
GetModuleFileNameA
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
WideCharToMultiByte
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
SetStdHandle
FlushFileBuffers
GetConsoleCP
CreateFileW
GetFileAttributesExW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
HeapReAlloc
OutputDebugStringW
LoadLibraryW
WriteConsoleW
SetEndOfFile
GetStringTypeW
LCMapStringW
HeapSize
advapi32
ClearEventLogA
AddAccessDeniedAce
CloseEventLog
comctl32
ImageList_SetDragCursorImage
PropertySheetA
ImageList_SetIconSize
Sections
.text Size: 102KB - Virtual size: 104KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 19KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 10KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.qrdm Size: 558KB - Virtual size: 560KB
IMAGE_SCN_MEM_READ