Static task
static1
Behavioral task
behavioral1
Sample
0af572297faa1223a64292c01c3eeac4c19b6ff3eaff97d8ae553da5a7912a7bN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0af572297faa1223a64292c01c3eeac4c19b6ff3eaff97d8ae553da5a7912a7bN.exe
Resource
win10v2004-20240802-en
General
-
Target
0af572297faa1223a64292c01c3eeac4c19b6ff3eaff97d8ae553da5a7912a7bN
-
Size
450KB
-
MD5
fe1fc1861f77c175689df839ca5f7390
-
SHA1
57d1cd100e0aca4513166b8f0ab6cdc308fee679
-
SHA256
0af572297faa1223a64292c01c3eeac4c19b6ff3eaff97d8ae553da5a7912a7b
-
SHA512
5d6408955c626a2a6fc964a50050edee3bd1d116240d3d56b6cab675581ee3d61ff1402e2076c1fdee0e11e16f7c7de5e6c9cc355b5da5a897565f99d67ff582
-
SSDEEP
6144:GCBDEYlP4TFu+lw6Q2DMeAkcFucTzxZ+oCIQyystXdpJm3L6W2D+FELu:XBo3TFu4t/AbFu6/LCIQyHNfM0D+3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0af572297faa1223a64292c01c3eeac4c19b6ff3eaff97d8ae553da5a7912a7bN
Files
-
0af572297faa1223a64292c01c3eeac4c19b6ff3eaff97d8ae553da5a7912a7bN.exe windows:4 windows x86 arch:x86
9bb31b82bdc7e4b46aa86c84f82629a8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLastError
FlushViewOfFile
MapViewOfFile
GetModuleHandleA
VirtualAlloc
GetTempPathA
LoadLibraryA
GlobalFree
GlobalAlloc
GetFileSize
LocalAlloc
CreateFileMappingA
WriteFile
Sleep
FindClose
FindNextFileA
FreeLibrary
EndUpdateResourceA
UpdateResourceA
SizeofResource
BeginUpdateResourceA
LockResource
LoadResource
ResumeThread
CopyFileA
FreeResource
VirtualProtect
GetProcAddress
SetLastError
CreateFileA
GetStringTypeA
LCMapStringW
LCMapStringA
MultiByteToWideChar
SetFilePointer
FlushFileBuffers
GetOEMCP
GetACP
GetCPInfo
RtlUnwind
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetModuleFileNameA
UnhandledExceptionFilter
SetStdHandle
GetCurrentProcess
TerminateProcess
IsBadWritePtr
HeapReAlloc
HeapCreate
HeapDestroy
GetVersion
GetCommandLineA
GetStartupInfoA
ReadFile
CreateMutexA
VirtualFree
GetProcessHeap
HeapAlloc
ExitProcess
CreateThread
CloseHandle
HeapFree
GetStringTypeW
WaitForMultipleObjects
user32
UpdateWindow
LoadCursorA
DefWindowProcA
GetClientRect
CreateWindowExA
ShowWindow
MoveWindow
GetWindowLongA
GetDC
RegisterClassExA
GetIconInfo
CopyImage
DrawIcon
GetMessageA
TranslateAcceleratorA
TranslateMessage
DispatchMessageA
LoadAcceleratorsA
IsWindowVisible
LoadIconA
ReleaseDC
DestroyIcon
CreateIconIndirect
CreateDialogParamA
EndDialog
LoadStringA
DialogBoxParamA
DestroyWindow
BeginPaint
DrawTextA
EndPaint
PostQuitMessage
IsWindow
gdi32
GetObjectA
CreateSolidBrush
CreatePen
Rectangle
DeleteObject
SelectObject
EnumObjects
GetDIBits
CreateCompatibleBitmap
CreateDCA
ole32
CoUninitialize
CoInitialize
pdh
PdhCollectQueryData
PdhAddCounterA
PdhOpenQueryA
Sections
.text Size: 40KB - Virtual size: 38KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 172KB - Virtual size: 176KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 4KB - Virtual size: 534KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 34KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.sdata Size: 164KB - Virtual size: 163KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE