Static task
static1
Behavioral task
behavioral1
Sample
3468c695a5dd50a99393832613a7432f7d3171eab99d0154e7d2eb5dbc07b8e8N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3468c695a5dd50a99393832613a7432f7d3171eab99d0154e7d2eb5dbc07b8e8N.exe
Resource
win10v2004-20240802-en
General
-
Target
3468c695a5dd50a99393832613a7432f7d3171eab99d0154e7d2eb5dbc07b8e8N
-
Size
157KB
-
MD5
a579bbe96e4a3e15653ab02e60927e70
-
SHA1
4be1539006aca580caa09a546f13eb0e10a8ecc0
-
SHA256
3468c695a5dd50a99393832613a7432f7d3171eab99d0154e7d2eb5dbc07b8e8
-
SHA512
6336e650cba92b11251a4ee393ba825695cfe7a1009dfaef93eb79046f19a5c5c6c483abb005a2264eb4a627482d3aea1559ebf464a89746b3c602a9f666f257
-
SSDEEP
3072:teVsjyYsAq/C3RCzgJHvNA1PpYfFL6zU+BEfi:4OjjqahUSPe1SZ+h
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3468c695a5dd50a99393832613a7432f7d3171eab99d0154e7d2eb5dbc07b8e8N
Files
-
3468c695a5dd50a99393832613a7432f7d3171eab99d0154e7d2eb5dbc07b8e8N.exe windows:5 windows x86 arch:x86
cb59e9f2348b37e98c5e9c617c66b271
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
memcpy
_snprintf
memset
netapi32
NetQueryDisplayInformation
NetApiBufferFree
NetUserGetInfo
shell32
ord680
shlwapi
StrStrIA
PathFileExistsA
ntdll
RtlCreateUserThread
RtlAdjustPrivilege
kernel32
GlobalFindAtomA
GetModuleFileNameW
GlobalAddAtomA
WriteProcessMemory
VirtualAllocEx
CreateProcessA
CreateRemoteThread
MultiByteToWideChar
FlushInstructionCache
Sleep
ExitProcess
HeapValidate
GetProcessHeap
HeapFree
HeapAlloc
GetTempPathA
GetTempFileNameA
GetProcAddress
GetModuleFileNameA
GetModuleHandleA
GetTickCount
GetVolumeInformationA
GetSystemWindowsDirectoryA
VirtualQuery
GetCurrentProcess
VirtualFree
VirtualAlloc
DeleteFileA
Process32First
OpenProcess
Process32Next
CreateToolhelp32Snapshot
CloseHandle
CreateFileA
MoveFileExA
lstrcpynA
SetEndOfFile
SetFileTime
WriteFile
IsBadWritePtr
ReadFile
GetFileSizeEx
GetFileTime
CopyFileA
user32
CharUpperA
advapi32
RegSetValueExA
RegOpenKeyExA
RegCreateKeyExA
CreateProcessWithLogonW
GetUserNameA
RegCloseKey
RegFlushKey
RegQueryValueExA
ole32
CoUninitialize
CoCreateInstance
CoInitializeEx
oleaut32
SysFreeString
SysAllocString
Sections
.text Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 136KB - Virtual size: 159KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ