Static task
static1
Behavioral task
behavioral1
Sample
f4ff480a6a39bddbba2fdde4b5899f4a3a399623237e77aac3032a3177b65260N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
f4ff480a6a39bddbba2fdde4b5899f4a3a399623237e77aac3032a3177b65260N.exe
Resource
win10v2004-20240802-en
General
-
Target
f4ff480a6a39bddbba2fdde4b5899f4a3a399623237e77aac3032a3177b65260N
-
Size
156KB
-
MD5
9b4c9b4275a0c7bec460f233b8d0b360
-
SHA1
f3db03e3e201e9ad5fafdd73de356dbede7b4a36
-
SHA256
f4ff480a6a39bddbba2fdde4b5899f4a3a399623237e77aac3032a3177b65260
-
SHA512
468055564cc15142321a8c4c5c359bf11df9d07d1e3d686e32752d042833140c71d80d5994df28bdea1118b5ee6733059b1752092b0e4994c889466da0d33fb0
-
SSDEEP
1536:/Beq9epzMzUQJIY5EZsM3uPJC7QTtqKvQxADKVArxhoJM:5PWzCNJI6FM3oERADKQhoJM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f4ff480a6a39bddbba2fdde4b5899f4a3a399623237e77aac3032a3177b65260N
Files
-
f4ff480a6a39bddbba2fdde4b5899f4a3a399623237e77aac3032a3177b65260N.exe windows:5 windows x86 arch:x86
a855b091c0ae4ce0295af763a5576704
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
HeapFree
HeapAlloc
GetProcessHeap
ReadFile
LocalAlloc
GetAtomNameA
GetFileSize
GetThreadPriorityBoost
CreateFileA
GetModuleFileNameA
OpenEventW
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
SetUnhandledExceptionFilter
GetStartupInfoA
InterlockedCompareExchange
Sleep
InterlockedExchange
IsDebuggerPresent
user32
LoadCursorA
CreateWindowExA
ShowWindow
UpdateWindow
RegisterClassExA
LoadIconA
msvcr90
__getmainargs
_cexit
_exit
_XcptFilter
_ismbblead
exit
_acmdln
_amsg_exit
_initterm_e
_configthreadlocale
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
_encode_pointer
__set_app_type
_except_handler4_common
_unlock
__dllonexit
_lock
_onexit
_decode_pointer
_invoke_watson
_controlfp_s
_crt_debugger_hook
?terminate@@YAXXZ
strcpy
??3@YAXPAX@Z
_initterm
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 76KB - Virtual size: 78KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 71KB - Virtual size: 71KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ