Static task
static1
Behavioral task
behavioral1
Sample
d7ac2f81909e21e49126c9cb2a3a6cb0N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d7ac2f81909e21e49126c9cb2a3a6cb0N.exe
Resource
win10v2004-20240802-en
General
-
Target
d7ac2f81909e21e49126c9cb2a3a6cb0N.exe
-
Size
420KB
-
MD5
d7ac2f81909e21e49126c9cb2a3a6cb0
-
SHA1
0ae94245374661d2710482117d5f7744c0642a42
-
SHA256
600ab20a8acf165ae0b45a8dcd4b77069d31ce94cf9b7ba21204dd4c6402989a
-
SHA512
0a7b13fa9f8dccec4bef0f63d363dc4e38b64da58c8795ecc86315c12eb51815f97fd86980a463d0191ef00eb24f315ed7bd929b650ec9dfd406bc10dff1f722
-
SSDEEP
6144:WDvbiz6deBK76wnxEjqLQZ1q+ec61LgoRqRxVwdxO4nIZMGdsBWBPsfTV4b0tCUf:mbi6deBU6wnxPOkl3LTqqI0AMosG6n
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d7ac2f81909e21e49126c9cb2a3a6cb0N.exe
Files
-
d7ac2f81909e21e49126c9cb2a3a6cb0N.exe.exe windows:4 windows x86 arch:x86
92071bb0aab5c7db035e8ded7d353a95
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetStartupInfoW
GetStringTypeA
CloseHandle
FreeLibraryAndExitThread
SetThreadContext
lstrcpynA
GetCommandLineA
GlobalFlags
GetTickCount
SetEnvironmentVariableA
GetUserDefaultLCID
LocalFileTimeToFileTime
PulseEvent
IsDebuggerPresent
GetFullPathNameW
InterlockedIncrement
ReleaseSemaphore
GetDriveTypeA
LCMapStringA
GetPrivateProfileStringW
GetPrivateProfileIntW
ReadFile
HeapReAlloc
SetFilePointer
SetHandleCount
InterlockedDecrement
GetSystemTimeAsFileTime
FreeLibrary
GetModuleHandleW
Sleep
SetStdHandle
WriteConsoleW
GetConsoleOutputCP
WaitNamedPipeA
GetModuleFileNameW
FoldStringW
VirtualAlloc
EnumSystemLocalesA
GetCurrentThread
TlsAlloc
EnumResourceLanguagesW
HeapFree
GetConsoleCP
HeapSize
GetACP
GetConsoleMode
HeapDestroy
SetUnhandledExceptionFilter
GetTimeZoneInformation
GetOEMCP
LocalCompact
GetLogicalDriveStringsW
WideCharToMultiByte
GetPrivateProfileStructW
GetEnvironmentStringsW
VirtualQuery
EnterCriticalSection
GetLastError
IsValidLocale
CreateMutexA
TerminateProcess
GetStringTypeW
LoadLibraryA
SetConsoleCtrlHandler
GetShortPathNameA
GetCurrentThreadId
GetDateFormatA
VirtualFree
GetProcessShutdownParameters
CreateDirectoryA
CompareStringA
UnhandledExceptionFilter
TlsFree
SetConsoleTitleA
ReadConsoleInputW
GetCalendarInfoA
SetLastError
GetLocaleInfoW
GetThreadTimes
TlsGetValue
SetPriorityClass
FreeEnvironmentStringsW
HeapCreate
ExitProcess
GetStartupInfoA
GetLocaleInfoA
ResumeThread
GetNamedPipeInfo
GetThreadLocale
GetStdHandle
GetCurrentProcess
GetThreadPriority
WriteConsoleA
LCMapStringW
OpenMutexA
LeaveCriticalSection
GetFileType
GetVersionExW
WriteFile
GetEnvironmentVariableW
FormatMessageW
GetProcAddress
MultiByteToWideChar
InterlockedExchange
CopyFileA
GetModuleFileNameA
GetModuleHandleA
HeapAlloc
GetCurrentProcessId
IsValidCodePage
GetComputerNameA
GetCPInfo
InitializeCriticalSectionAndSpinCount
TlsSetValue
GetTimeFormatA
SetFileAttributesA
GetCommandLineW
WriteProfileStringW
ReadConsoleW
FlushFileBuffers
lstrcatA
GetEnvironmentVariableA
CreateFileA
DeleteCriticalSection
CompareStringW
QueryPerformanceCounter
RtlUnwind
SetConsoleWindowInfo
comctl32
ImageList_DragMove
GetEffectiveClientRect
ImageList_Duplicate
DrawInsert
ImageList_BeginDrag
ImageList_GetIcon
ImageList_DrawEx
CreateToolbar
ImageList_Create
ImageList_Copy
CreateUpDownControl
InitMUILanguage
ImageList_GetImageCount
InitCommonControlsEx
ImageList_SetImageCount
ImageList_GetFlags
CreateStatusWindowA
user32
GetCursorInfo
ReplyMessage
ShowCaret
SetActiveWindow
DdeInitializeA
SetSystemCursor
DefWindowProcA
CallMsgFilterA
RemovePropW
DlgDirListW
GetKeyState
GetDlgItem
DlgDirListComboBoxA
SetWindowLongA
GetScrollBarInfo
SendIMEMessageExW
RegisterClassA
GetWindowTextA
PaintDesktop
IsCharUpperA
SetUserObjectInformationA
MessageBoxW
ShowWindow
InSendMessageEx
GetQueueStatus
KillTimer
CharToOemA
LoadAcceleratorsW
GetWindowRgn
DlgDirSelectComboBoxExW
DdeReconnect
DrawFrame
BringWindowToTop
RegisterClipboardFormatA
SetWindowWord
TileWindows
DialogBoxParamA
GetMessagePos
CreateDesktopW
FindWindowA
AdjustWindowRect
DialogBoxIndirectParamW
SetRectEmpty
ClientToScreen
DdeGetData
EnableMenuItem
GetGUIThreadInfo
CreateAcceleratorTableW
CallMsgFilterW
EndDeferWindowPos
GetLastActivePopup
DispatchMessageW
DdeFreeDataHandle
DrawIcon
wsprintfA
SendDlgItemMessageA
GetMenuInfo
DispatchMessageA
CreateAcceleratorTableA
DestroyAcceleratorTable
CloseClipboard
GetOpenClipboardWindow
RegisterClassExA
PostMessageA
OffsetRect
MonitorFromRect
LoadMenuIndirectA
DefMDIChildProcW
SetCursor
CharLowerA
GetCursor
PtInRect
CloseWindow
ValidateRgn
UnhookWinEvent
GetMonitorInfoW
SetWindowPlacement
EnumDisplaySettingsExA
LoadMenuA
CreateIconIndirect
GetDC
DestroyWindow
ShowScrollBar
DdeFreeStringHandle
CharNextA
CallNextHookEx
GetShellWindow
GetCaretBlinkTime
DeleteMenu
GetWindowLongW
UnregisterClassW
IsWindowVisible
DialogBoxIndirectParamA
IsWindow
IsCharAlphaNumericA
SetWindowPos
WINNLSGetEnableStatus
GetMenu
GetSysColor
CreateWindowExA
CharToOemBuffW
Sections
.text Size: 152KB - Virtual size: 150KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 80KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 96KB - Virtual size: 121KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 88KB - Virtual size: 87KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ