Static task
static1
Behavioral task
behavioral1
Sample
d424ed56d361fd9273d17b5ebb3a1ec4ad52da0a0468cd7649718c0503000c62N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
d424ed56d361fd9273d17b5ebb3a1ec4ad52da0a0468cd7649718c0503000c62N.exe
Resource
win10v2004-20240802-en
General
-
Target
d424ed56d361fd9273d17b5ebb3a1ec4ad52da0a0468cd7649718c0503000c62N.exe
-
Size
91KB
-
MD5
567014436eee5cf1eda33cc94e6801e0
-
SHA1
5c25a2cecc07633f71f80e9db00e1cb7b0281b60
-
SHA256
d424ed56d361fd9273d17b5ebb3a1ec4ad52da0a0468cd7649718c0503000c62
-
SHA512
a0e5f9276e296008e0222a1f25202510fc9734e954ce518b498d254c2ce32947f76dd8c8a2b0e83416c82c9a7aa884763001a837f5c752e4b635f04748b2f993
-
SSDEEP
1536:1WGxs9kGdYk8wO4Cnt8RUyhosM9DC9cTu:UGfGdYSCnNyhoZTu
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d424ed56d361fd9273d17b5ebb3a1ec4ad52da0a0468cd7649718c0503000c62N.exe
Files
-
d424ed56d361fd9273d17b5ebb3a1ec4ad52da0a0468cd7649718c0503000c62N.exe.exe windows:4 windows x86 arch:x86
3c62127f13f538ce5d3686ca518ff247
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetComputerNameA
IsDBCSLeadByte
WriteFile
ReadFile
GetTempFileNameA
MultiByteToWideChar
CopyFileA
SetFileAttributesA
FindClose
FindNextFileA
FindFirstFileA
SetEndOfFile
LocalAlloc
GetTempPathA
DeleteFileA
WideCharToMultiByte
CreateProcessA
GetSystemDirectoryA
GetCurrentProcess
SystemTimeToFileTime
GetSystemTime
GetVersionExA
GetVersion
WaitForSingleObject
GetCommandLineA
ExpandEnvironmentStringsA
GetDriveTypeA
CreateThread
GetCurrentProcessId
GetLocalTime
LocalFree
GetLastError
SetFilePointer
GetFileTime
GetFileSize
FreeLibrary
LoadLibraryA
UnmapViewOfFile
CreateFileA
Process32First
CreateFileMappingA
MapViewOfFile
CreateToolhelp32Snapshot
Process32Next
GetModuleFileNameA
ReadProcessMemory
Module32First
OpenProcess
CloseHandle
TerminateProcess
Sleep
SetFileTime
GetTickCount
GetProcAddress
LCMapStringW
LCMapStringA
FlushFileBuffers
SetStdHandle
HeapReAlloc
VirtualAlloc
GetStringTypeW
GetStringTypeA
RtlUnwind
VirtualFree
HeapCreate
HeapDestroy
GetFileType
GetStdHandle
GetModuleHandleA
GetStartupInfoA
ExitProcess
GetCPInfo
GetACP
GetOEMCP
SetHandleCount
HeapFree
HeapAlloc
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
advapi32
OpenSCManagerA
StartServiceCtrlDispatcherA
LookupPrivilegeValueA
AdjustTokenPrivileges
RegSetValueExA
RegQueryValueExA
RegCreateKeyA
RegConnectRegistryA
OpenProcessToken
StartServiceA
AllocateAndInitializeSid
EqualSid
GetTokenInformation
RegisterServiceCtrlHandlerA
OpenServiceA
FreeSid
CloseServiceHandle
RegEnumValueA
CreateServiceA
RegOpenKeyA
RegEnumKeyA
RegDeleteValueA
SetServiceStatus
RegCloseKey
ws2_32
gethostbyname
closesocket
WSACleanup
recv
send
htons
connect
WSAGetLastError
WSAStartup
socket
mpr
WNetOpenEnumA
WNetEnumResourceA
WNetCloseEnum
Sections
.text Size: 48KB - Virtual size: 46KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 535KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ