Static task
static1
Behavioral task
behavioral1
Sample
d4f97341c63f18ec4dd366a44fb4e8b737046afee338766dd3bca6efed65fcb8N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d4f97341c63f18ec4dd366a44fb4e8b737046afee338766dd3bca6efed65fcb8N.exe
Resource
win10v2004-20240802-en
General
-
Target
d4f97341c63f18ec4dd366a44fb4e8b737046afee338766dd3bca6efed65fcb8N
-
Size
64KB
-
MD5
fae28718558750870c6f7c12e111e300
-
SHA1
c93362afcbdf46e3574b1741f7c4f118ef4dc913
-
SHA256
d4f97341c63f18ec4dd366a44fb4e8b737046afee338766dd3bca6efed65fcb8
-
SHA512
cc0c609ecf148f43a8d12c37da3c50e935a2d82803270aa3c95af1fd85aee354e9e5d201ec0b4d904c9d4abc87951c4f81c8c58d1522ba17b7cfca385fa62535
-
SSDEEP
768:1xK7HArmfbvq+B4cajfuJuodf9Gn6LOK4m37+XuSHm5VjgucaB8qi/m9XW0sjMYY:LKHArkjqdjuJNyn6Z9qeSGXaO98XLK
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d4f97341c63f18ec4dd366a44fb4e8b737046afee338766dd3bca6efed65fcb8N
Files
-
d4f97341c63f18ec4dd366a44fb4e8b737046afee338766dd3bca6efed65fcb8N.exe windows:4 windows x86 arch:x86
d5581d0e24682b678ea4d9bb096dd8d6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
ShellExecuteA
SHGetFileInfoA
SHGetSpecialFolderPathW
wininet
InternetQueryOptionW
HttpQueryInfoW
InternetOpenA
InternetCloseHandle
InternetReadFile
InternetQueryDataAvailable
InternetOpenUrlA
InternetGetConnectedState
shlwapi
PathAppendA
PathFindExtensionA
PathAppendW
ntdll
wcsstr
atoi
_memicmp
sscanf
_chkstk
sprintf
wcsrchr
strstr
vsprintf
_strnicmp
isxdigit
wcscmp
wcslen
memmove
strncmp
strchr
_wcsicmp
memset
memcpy
strlen
_snprintf
ws2_32
inet_addr
closesocket
connect
ioctlsocket
socket
htons
sendto
send
WSAStartup
inet_ntoa
getpeername
ntohs
setsockopt
select
recv
WSACleanup
gethostbyname
msvcrt
??2@YAPAXI@Z
malloc
calloc
realloc
free
srand
rand
strtok
??3@YAXPAX@Z
kernel32
lstrcpynW
GetWindowsDirectoryW
WriteFile
GetVolumeInformationW
VirtualProtect
CreateRemoteThread
VirtualFreeEx
GetCurrentProcessId
OpenProcess
VirtualAllocEx
WriteProcessMemory
ReadProcessMemory
GetModuleHandleA
GetWindowsDirectoryA
GetModuleFileNameA
OpenMutexW
lstrcpyW
CreateDirectoryA
GetFileSize
LockFile
DeviceIoControl
SetCurrentDirectoryA
FindFirstFileA
FindNextFileA
FindClose
GetFileAttributesA
MultiByteToWideChar
DeleteFileW
GetTempFileNameW
FlushFileBuffers
DisconnectNamedPipe
CreateNamedPipeA
ConnectNamedPipe
CreateMutexW
WaitForSingleObject
InitializeCriticalSection
ReadFile
CreateThread
EnterCriticalSection
LeaveCriticalSection
GetVersionExA
GetLocaleInfoA
GetModuleFileNameW
lstrcatW
HeapReAlloc
lstrcatA
CreateFileMappingA
OpenFileMappingA
MapViewOfFile
GetProcessHeap
UnmapViewOfFile
GetFileTime
FileTimeToSystemTime
lstrcpyA
MoveFileExA
lstrcmpA
WideCharToMultiByte
MoveFileExW
lstrcmpW
ExitThread
DeleteFileA
SetFileAttributesA
HeapFree
lstrcpynA
HeapAlloc
ExitProcess
SetFileAttributesW
lstrlenA
Sleep
GetTickCount
GetLastError
CloseHandle
GetSystemTime
CreateFileW
lstrlenW
CreateProcessW
CreateFileA
GetProcAddress
LoadLibraryA
GetCurrentProcess
CopyFileW
user32
GetMessageA
RegisterClassExA
TranslateMessage
DispatchMessageA
DefWindowProcA
CreateWindowExA
RegisterDeviceNotificationA
wvsprintfA
advapi32
RegCloseKey
LookupPrivilegeValueA
OpenProcessToken
CryptGetHashParam
RegCreateKeyExW
RegSetValueExW
AdjustTokenPrivileges
CryptAcquireContextA
CryptCreateHash
CryptReleaseContext
CryptHashData
CryptDestroyHash
ole32
CoInitialize
CoCreateInstance
Sections
.text Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 80KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE