Static task
static1
Behavioral task
behavioral1
Sample
stage_4.2.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
stage_4.2.exe
Resource
win10v2004-20240910-en
General
-
Target
stage_4.2.exe
-
Size
326KB
-
MD5
760819f27f3110eea93c372169ec9c3c
-
SHA1
09d8c37a6aa959bc4b414e5d601f654bff9700d4
-
SHA256
5aead2773474aa64c7e5300d49eca7ee01174fe806fd73f4a878ae4b2a4aaca1
-
SHA512
d4c2ed1f32eae53e15c0445c3f87e89876197ed5f65499afbbc3ecb9ff2ea4bca13696c6520c04ead8861ccca4d7727d19ca141aa483414f4a412a71013094c5
-
SSDEEP
6144:RP5irYuB5ZuZAGW6fIdnum2vKU7fKrILt4FtDyNe6FVX17fET8ijBBvSzHBi20ik:RRnuB5ZuVCPDy4MA9ErEGXy/zrKwUrO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource stage_4.2.exe
Files
-
stage_4.2.exe.exe windows:6 windows x86 arch:x86
8a08f05f951e29daf72a243fb2aa4e67
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
CloseClipboard
GetClipboardData
GetDC
GetInputState
GetSystemMetrics
GetWindowLongW
OpenClipboard
ReleaseDC
kernel32
CopyFileW
ExitProcess
GetCommandLineW
GetCurrentProcessId
GetCurrentThreadId
GetLogicalDrives
GetSystemDirectoryW
GlobalLock
GlobalUnlock
ole32
CoCreateInstance
CoInitialize
CoInitializeSecurity
CoSetProxyBlanket
CoUninitialize
oleaut32
SysAllocString
SysFreeString
SysStringLen
VariantClear
VariantInit
gdi32
BitBlt
CreateCompatibleBitmap
CreateCompatibleDC
DeleteDC
DeleteObject
GetCurrentObject
GetDIBits
GetObjectW
SelectObject
StretchBlt
Sections
.text Size: 269KB - Virtual size: 269KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 25KB - Virtual size: 61KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ