Static task
static1
Behavioral task
behavioral1
Sample
04f53b28c6b5f04c6e24c982c45c8575f85a5d3fc3330e9f68bcc342eaa19089.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
04f53b28c6b5f04c6e24c982c45c8575f85a5d3fc3330e9f68bcc342eaa19089.exe
Resource
win10v2004-20240802-en
General
-
Target
04f53b28c6b5f04c6e24c982c45c8575f85a5d3fc3330e9f68bcc342eaa19089
-
Size
60KB
-
MD5
f2e4bdd4993b3c3b627c61b880eae1ad
-
SHA1
f36f981b54690d4a0e50eac6b213325e7d23175c
-
SHA256
04f53b28c6b5f04c6e24c982c45c8575f85a5d3fc3330e9f68bcc342eaa19089
-
SHA512
cf1454ca5c6447bf2eafc0ec5a3027ae90f3fb604133d90c82c78d06134f837dd08aee0570bd6e6dc071a80d9bc5b6caea8c30d2fc8a45c3a33a74fa110dbb05
-
SSDEEP
1536:weKhgAqkBBcgrHLT/3jPzLXvnr3jPwWEboGiLDvTr7HfLXFMSQXbTgbhRjB:wrhfrrHLT/3jPzLXvnr3jPwPboGiLDvL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 04f53b28c6b5f04c6e24c982c45c8575f85a5d3fc3330e9f68bcc342eaa19089
Files
-
04f53b28c6b5f04c6e24c982c45c8575f85a5d3fc3330e9f68bcc342eaa19089.exe windows:4 windows x86 arch:x86
c1583f3ec1c368dfc99e2aed54d8ad02
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
OpenSCManagerA
OpenServiceA
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
StartServiceW
gdiplus
GdiplusShutdown
GdiplusStartup
kernel32
CloseHandle
CopyFileExA
CreateToolhelp32Snapshot
DeleteCriticalSection
EnterCriticalSection
FindClose
FindFirstFileW
FreeLibrary
GetCommandLineW
GetConsoleMode
GetConsoleScreenBufferInfo
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetLargestConsoleWindowSize
GetLastError
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleW
GetNativeSystemInfo
GetProcAddress
GetProcessId
GetStartupInfoA
GetStdHandle
GetSystemDirectoryW
GetSystemTimeAsFileTime
GetTempPathW
GetTickCount
GetWindowsDirectoryA
GetWindowsDirectoryW
InitializeCriticalSection
IsWow64Process
LeaveCriticalSection
LoadLibraryA
LocalFree
MultiByteToWideChar
OpenProcess
PeekConsoleInputA
Process32First
Process32Next
QueryPerformanceCounter
ReadConsoleInputA
SetConsoleCtrlHandler
SetConsoleMode
SetConsoleWindowInfo
SetFileAttributesW
SetUnhandledExceptionFilter
Sleep
TerminateProcess
TlsGetValue
UnhandledExceptionFilter
VirtualProtect
VirtualQuery
WaitForSingleObject
WideCharToMultiByte
WriteConsoleInputA
msvcrt
__getmainargs
__initenv
__lconv_init
__p__acmdln
__p__fmode
__set_app_type
__setusermatherr
_amsg_exit
_cexit
_controlfp
_fmode
_fpreset
_initterm
_iob
_onexit
_snprintf
abort
calloc
exit
fprintf
fputs
free
fwrite
islower
isupper
malloc
mbstowcs
memset
memcpy
realloc
setlocale
signal
strchr
strlen
strncmp
tolower
toupper
vfprintf
wcslen
wcstombs
psapi
GetModuleFileNameExA
GetModuleFileNameExW
shell32
CommandLineToArgvW
SHFileOperationW
SHGetSpecialFolderPathW
ShellExecuteExW
user32
MapVirtualKeyA
VkKeyScanA
Sections
.text Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 56B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.eh_fram Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 34KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 52B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE