Static task
static1
Behavioral task
behavioral1
Sample
264492f5a3848a5b5939368dceb63ed0N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
264492f5a3848a5b5939368dceb63ed0N.exe
Resource
win10v2004-20240802-en
General
-
Target
264492f5a3848a5b5939368dceb63ed0N
-
Size
387KB
-
MD5
264492f5a3848a5b5939368dceb63ed0
-
SHA1
56f0394d689bd0a160b6be8a6554ffe050ff0353
-
SHA256
9e63a0b8cee81a6872621af7656f617a6c31bb1dedb7647e45bfc36ad8b4fcac
-
SHA512
ed8e223616670492216e9e336eff69297fb267c39e5dc87f7827d61a67263101aab0ff0d8ecc1f7ed1981cc3397b901690c020d6bc1a6e1a86ff312a7db78e85
-
SSDEEP
6144:7B0321qBdyJvSHPSzvU6G4o77ll0rRcQZLGpxBY2dUWnvjV4pzf:76m4BdyUb6/oPjUmAQxB3dJJi
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 264492f5a3848a5b5939368dceb63ed0N
Files
-
264492f5a3848a5b5939368dceb63ed0N.exe windows:5 windows x86 arch:x86
cc7e59ab8e5b2180a778ccad5b417493
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetEndOfFile
InterlockedIncrement
EnumCalendarInfoW
InterlockedDecrement
GetCurrentProcess
SetEnvironmentVariableW
CreateJobObjectW
SetVolumeMountPointW
UnlockFile
CreateHardLinkA
GetModuleHandleW
GetTickCount
EnumCalendarInfoExW
FindNextVolumeMountPointA
GetNumberFormatA
SetCommState
CreateActCtxW
TlsSetValue
GlobalAlloc
SetFileShortNameW
LoadLibraryW
GetCalendarInfoW
GetCalendarInfoA
CreateEventA
SetVolumeMountPointA
GetConsoleAliasExesLengthW
GetFileAttributesA
VerifyVersionInfoA
GetModuleFileNameW
GetThreadPriorityBoost
LCMapStringA
InterlockedExchange
GetConsoleAliasExesA
GetLastError
GetCurrentDirectoryW
SetLastError
GetProcAddress
CreateNamedPipeA
GetProcessVersion
CreateFileMappingW
GlobalWire
EnumDateFormatsA
VirtualProtect
OpenEventW
PeekConsoleInputA
GetShortPathNameW
SetProcessShutdownParameters
GetDiskFreeSpaceExW
ReadConsoleInputW
GetWindowsDirectoryW
DebugBreak
GetTempPathA
LocalFree
CommConfigDialogW
CloseHandle
WriteConsoleW
FlushFileBuffers
CreateFileW
GetConsoleMode
GetConsoleCP
GetLocaleInfoA
PeekNamedPipe
SetDefaultCommConfigA
GetLogicalDriveStringsA
EnumResourceNamesW
MultiByteToWideChar
HeapFree
HeapAlloc
EncodePointer
DecodePointer
GetCommandLineW
HeapSetInformation
GetStartupInfoW
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsFree
GetCurrentThreadId
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
IsProcessorFeaturePresent
HeapCreate
ExitProcess
WriteFile
GetStdHandle
Sleep
HeapSize
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
SetFilePointer
EnterCriticalSection
LeaveCriticalSection
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
WideCharToMultiByte
LCMapStringW
GetStringTypeW
RaiseException
HeapReAlloc
RtlUnwind
SetStdHandle
user32
GetMenuStringW
GetMenu
DrawStateA
LoadMenuW
GetWindowLongA
GetSysColor
GetCaretPos
CharUpperA
gdi32
GetCharWidthFloatA
CreateDCA
GetCharWidth32A
GetBkMode
Sections
.text Size: 250KB - Virtual size: 249KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 94KB - Virtual size: 32.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.harulah Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bamojit Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.dakuy Size: 1024B - Virtual size: 923B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ