Static task
static1
Behavioral task
behavioral1
Sample
226f7a154a2b7e08d33fa456630f37bace9df01a6a781adf9f8a8d5c25d6efcfN.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
226f7a154a2b7e08d33fa456630f37bace9df01a6a781adf9f8a8d5c25d6efcfN.exe
Resource
win10v2004-20240802-en
General
-
Target
226f7a154a2b7e08d33fa456630f37bace9df01a6a781adf9f8a8d5c25d6efcfN.exe
-
Size
106KB
-
MD5
fc99ae7c1213311b0f5ba99ffa3c5e00
-
SHA1
c0bd744f6482babf491c48e3f44b22ab24b53bd7
-
SHA256
226f7a154a2b7e08d33fa456630f37bace9df01a6a781adf9f8a8d5c25d6efcf
-
SHA512
e9b1606aae354bcc1500c66c8c5f49a107d6cdb92d6f19b86e6bea109505d6a6dd0112a15f6996b82064197eb14b5b8472b07099fdf14661a266885582b1b2f7
-
SSDEEP
1536:2zfXIsxrhzk2nfsW3ou3yWW2dvcW6eHcBwUi6vWE0Dl27b58XBdqaMGxuA1B:yfjxrhzk2nfsWhP7dvavi6vWEbh8XT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 226f7a154a2b7e08d33fa456630f37bace9df01a6a781adf9f8a8d5c25d6efcfN.exe
Files
-
226f7a154a2b7e08d33fa456630f37bace9df01a6a781adf9f8a8d5c25d6efcfN.exe.exe windows:4 windows x86 arch:x86
ab015834f3e86347ca49c19f25f215f6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
crtdll
memset
strlen
_strnicmp
strncmp
strncpy
strcpy
atof
strcat
localtime
mktime
gmtime
user32
wsprintfA
GetWindowThreadProcessId
KillTimer
SetTimer
wvsprintfA
MessageBoxA
IsWindowVisible
IsWindowEnabled
GetForegroundWindow
EnableWindow
EnumWindows
GetWindowLongA
CallWindowProcA
DefWindowProcA
SetWindowLongA
SetWindowTextA
DestroyWindow
SendMessageA
CreateWindowExA
LoadCursorA
LoadIconA
RegisterClassA
GetSysColor
PeekMessageA
GetActiveWindow
TranslateAcceleratorA
TranslateMessage
DispatchMessageA
AdjustWindowRect
GetSystemMetrics
GetWindowRect
ShowWindow
GetMessageA
GetClassNameA
PostMessageA
GetParent
GetWindow
SetWindowPos
SetFocus
SetActiveWindow
UnregisterClassA
DestroyAcceleratorTable
GetFocus
IsChild
EnumChildWindows
GetKeyState
CreateAcceleratorTableA
SetCursorPos
LoadImageA
SetCursor
SystemParametersInfoA
SetCapture
GetCursorPos
MapWindowPoints
ReleaseCapture
MoveWindow
advapi32
RegCreateKeyA
RegSetValueExA
RegCloseKey
wininet
DeleteUrlCacheEntryA
InternetOpenA
InternetOpenUrlA
InternetReadFile
InternetCloseHandle
oleaut32
SysAllocStringLen
SysFreeString
SysAllocString
ole32
CoInitialize
CoCreateInstance
CoUninitialize
urlmon
URLDownloadToFileA
gdi32
GetStockObject
CreateBrushIndirect
comctl32
InitCommonControls
kernel32
GetModuleHandleA
GetCommandLineA
ExitProcess
HeapCreate
GetSystemDirectoryA
GetModuleFileNameA
LoadLibraryA
GetProcAddress
GlobalAlloc
OpenProcess
CloseHandle
GetLastError
GetEnvironmentVariableA
GetCurrentDirectoryA
SystemTimeToFileTime
GetFileAttributesA
SetFileAttributesA
CreateFileA
SetFileTime
GetFileTime
HeapDestroy
HeapReAlloc
FreeLibrary
HeapAlloc
IsBadReadPtr
HeapFree
GlobalFree
MultiByteToWideChar
WideCharToMultiByte
SetUnhandledExceptionFilter
GetVersionExA
GetCurrentThreadId
GetCurrentProcessId
WaitForSingleObject
GetTickCount
Sleep
FindClose
FindFirstFileA
FindNextFileA
ReadFile
SetFilePointer
GetFileSize
WriteFile
GetLocalTime
shell32
ShellExecuteExA
Sections
.text Size: 65KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.flat Size: 1024B - Virtual size: 617B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE