Static task
static1
Behavioral task
behavioral1
Sample
2281399ff36408b6d4897c50b0acc1231b0261f47ddbdde23c86b3261f4b8bb6.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2281399ff36408b6d4897c50b0acc1231b0261f47ddbdde23c86b3261f4b8bb6.exe
Resource
win10v2004-20240802-en
General
-
Target
2281399ff36408b6d4897c50b0acc1231b0261f47ddbdde23c86b3261f4b8bb6
-
Size
432KB
-
MD5
e06ed56d785965d18dedf2259423f202
-
SHA1
8af9b75e82cb9feb33dcd4d46b91dd66df885e0f
-
SHA256
2281399ff36408b6d4897c50b0acc1231b0261f47ddbdde23c86b3261f4b8bb6
-
SHA512
836f4d7ce3f5e58a4e1be05f0f6e6ff38c6a80de64290ef047cf2d8ed2c2b0abda8aff2fcaf4680bf82e32f635cb83469b0fbad618b587fbf00bf6a6d53ccafa
-
SSDEEP
6144:AyiMagk06qtnhKZ53rw9mN7bTlPPfewOZwMUQS1GTMNxsFTmekZaGeiyLf97IlO3:Ayiq6qRYv3rpQIQkGINxsQ5aSr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2281399ff36408b6d4897c50b0acc1231b0261f47ddbdde23c86b3261f4b8bb6
Files
-
2281399ff36408b6d4897c50b0acc1231b0261f47ddbdde23c86b3261f4b8bb6.exe windows:4 windows x86 arch:x86
2db150bdb2324189d00e2be750482a15
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ResetEvent
Sleep
GetLastError
DeleteAtom
FindAtomA
AddAtomA
SetLastError
LocalReAlloc
GetCurrentThread
GetTickCount
ExitProcess
MoveFileA
GetProcAddress
GetSystemInfo
RtlUnwind
VirtualAlloc
VirtualProtect
GetModuleHandleA
GetLocaleInfoA
FlushFileBuffers
VirtualQuery
GetStringTypeW
GetStringTypeA
HeapSize
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
LCMapStringW
MultiByteToWideChar
LCMapStringA
InitializeCriticalSection
GetCPInfo
GetOEMCP
GetACP
GetStartupInfoA
GetCommandLineA
GetVersionExA
HeapAlloc
TerminateProcess
GetCurrentProcess
WriteFile
GetStdHandle
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
TlsFree
GetCurrentThreadId
TlsSetValue
TlsGetValue
TlsAlloc
HeapDestroy
HeapCreate
VirtualFree
HeapFree
LeaveCriticalSection
EnterCriticalSection
HeapReAlloc
LoadLibraryA
user32
FindWindowA
SetTimer
ShowWindow
LoadBitmapA
GetDC
LoadCursorA
GetParent
SendMessageA
gdi32
PatBlt
CreatePatternBrush
psapi
GetModuleBaseNameA
avifil32
AVIGetFromClipboard
shlwapi
SHOpenRegStream2A
SHDeleteValueA
gdiplus
GdipDeleteFontFamily
GdipCreateFontFamilyFromName
GdipDeleteFont
GdipDrawString
GdipCreateSolidFill
GdipDeleteBrush
GdipCloneBrush
GdipAlloc
GdipFree
GdipCreateFromHDC
GdipCreateFont
GdipDeleteGraphics
Sections
.text Size: 28KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 308KB - Virtual size: 306KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 463KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 68KB - Virtual size: 65KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ