Static task
static1
Behavioral task
behavioral1
Sample
d4c1b8edb52fcdf8f1954adab898f6222f19c19f29b96bbc16494ea2d3e6d5d9N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d4c1b8edb52fcdf8f1954adab898f6222f19c19f29b96bbc16494ea2d3e6d5d9N.exe
Resource
win10v2004-20240802-en
General
-
Target
d4c1b8edb52fcdf8f1954adab898f6222f19c19f29b96bbc16494ea2d3e6d5d9N
-
Size
304KB
-
MD5
f2541b4021cc1e30deaad3ef13dc2cd0
-
SHA1
83d0b524f5729117f647bb458e0cd47f8a127b15
-
SHA256
d4c1b8edb52fcdf8f1954adab898f6222f19c19f29b96bbc16494ea2d3e6d5d9
-
SHA512
6ca26c0e66c3a690a27f5e1664f2aa3f30091ed4d7c2f074a0f570bcdc065c79f2dfd54057bdb1ad2b0581148493eb61cabf08176d73b9d5a1af1b6bdbe7a141
-
SSDEEP
3072:WrAdPBoUyxX0+AR7092SSh3fxEfYGEMiME9gHA5VZR8FPFeOLiaI0lttGIZjOqHM:JjyVdARQjSdfZaiv9HVcFbtjOqR71gv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d4c1b8edb52fcdf8f1954adab898f6222f19c19f29b96bbc16494ea2d3e6d5d9N
Files
-
d4c1b8edb52fcdf8f1954adab898f6222f19c19f29b96bbc16494ea2d3e6d5d9N.exe windows:4 windows x86 arch:x86
9980a4c28a19d632e92bd7dc0717c4ae
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
SetUnhandledExceptionFilter
GetStartupInfoW
InterlockedCompareExchange
Sleep
InterlockedExchange
HeapSetInformation
LocalAlloc
LocalFree
GetLocaleInfoA
lstrlenW
lstrcpynW
UnhandledExceptionFilter
GetModuleHandleW
GetProcAddress
InterlockedIncrement
GetLastError
OutputDebugStringA
InterlockedDecrement
HeapFree
GetProcessHeap
HeapAlloc
IsDBCSLeadByte
FormatMessageA
lstrcatA
lstrcmpiA
CompareStringA
GlobalFree
lstrcpyA
GetModuleHandleA
GetLocaleInfoW
CompareStringW
GetUserDefaultUILanguage
GetCommandLineA
VirtualProtect
VirtualFree
LoadLibraryA
VirtualAlloc
GetStartupInfoA
user32
DefDlgProcA
LoadStringA
GetWindowTextA
LoadCursorW
RegisterClassW
EndDialog
GetWindowLongW
SetWindowLongW
SendMessageW
DestroyIcon
GetWindow
DestroyWindow
IsCharAlphaA
IsCharAlphaNumericA
CallWindowProcA
GetWindowLongA
MessageBoxIndirectA
DialogBoxParamA
CharNextA
LoadIconA
VkKeyScanA
MessageBeep
SetWindowTextA
GetWindowTextLengthA
WinHelpA
SetWindowLongA
ShowWindow
GetClassNameW
PostMessageW
LoadStringW
EnableWindow
GetDlgItem
MsgWaitForMultipleObjects
PeekMessageW
DispatchMessageW
CreateWindowExW
IsWindow
SendMessageA
advapi32
RegOpenKeyExW
RegCreateKeyExW
RegSetValueExW
RegQueryValueExA
RegCloseKey
gdi32
GetStockObject
ole32
CoUninitialize
CoMarshalInterThreadInterfaceInStream
CoQueryProxyBlanket
OleRun
CoCreateInstance
CoTaskMemFree
msvcr71
__p__commode
__getmainargs
_acmdln
_ismbblead
_exit
_c_exit
_wcsicmp
malloc
memcpy
_XcptFilter
free
_adjust_fdiv
_cexit
_amsg_exit
_initterm
_wcmdln
exit
_except_handler3
__p__fmode
__set_app_type
__dllonexit
_onexit
_controlfp
__setusermatherr
Sections
.text Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 272KB - Virtual size: 272KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 270KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sxdata Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ