Static task
static1
Behavioral task
behavioral1
Sample
d146e09264202c10da30cec8ba657ef7c209d6f519420ad97d83b1834da3e77cN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d146e09264202c10da30cec8ba657ef7c209d6f519420ad97d83b1834da3e77cN.exe
Resource
win10v2004-20240802-en
General
-
Target
d146e09264202c10da30cec8ba657ef7c209d6f519420ad97d83b1834da3e77cN
-
Size
7.8MB
-
MD5
edf535761cd44c0a31ac0a08baabf610
-
SHA1
96ae91c275c3c4616c8273bcbebd4190db00f17f
-
SHA256
d146e09264202c10da30cec8ba657ef7c209d6f519420ad97d83b1834da3e77c
-
SHA512
eed7819f2447be5dee97be727bef4214a73ef7c8ebed0155074c09e486e61a56c9ac94847baf0933d67459b56ca1ad06932ec0726bf46b6513fb81a0e9780bae
-
SSDEEP
196608:L/4KTo98P7VX8AC3wGoBC43STNhkkoQKoG1FQj4WXhX0q:vc9w72BAGqCTNFoLF1CjrE
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d146e09264202c10da30cec8ba657ef7c209d6f519420ad97d83b1834da3e77cN
Files
-
d146e09264202c10da30cec8ba657ef7c209d6f519420ad97d83b1834da3e77cN.exe windows:6 windows x64 arch:x64
885e0b7344093d54da92eed37a49f149
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
d3d11
D3D11CreateDeviceAndSwapChain
d3dcompiler_47
D3DCompile
kernel32
MoveFileExA
GetSystemTimeAsFileTime
HeapAlloc
HeapFree
ExitProcess
LoadLibraryA
GetModuleHandleA
GetProcAddress
user32
GetClientRect
gdi32
CreateDIBSection
advapi32
CryptGetHashParam
shell32
ShellExecuteA
d3dx11_43
D3DX11CreateShaderResourceViewFromMemory
msvcp140
?fill@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADXZ
imm32
ImmReleaseContext
dwmapi
DwmExtendFrameIntoClientArea
ntdll
RtlCaptureContext
shlwapi
PathFindFileNameW
normaliz
IdnToAscii
wldap32
ord211
crypt32
CertFreeCertificateChainEngine
ws2_32
WSAGetLastError
rpcrt4
UuidToStringA
psapi
GetModuleInformation
userenv
UnloadUserProfile
vcruntime140_1
__CxxFrameHandler4
vcruntime140
__std_terminate
api-ms-win-crt-stdio-l1-1-0
_set_fmode
api-ms-win-crt-utility-l1-1-0
rand
api-ms-win-crt-string-l1-1-0
_strdup
api-ms-win-crt-heap-l1-1-0
_set_new_mode
api-ms-win-crt-runtime-l1-1-0
_resetstkoflw
api-ms-win-crt-convert-l1-1-0
strtoll
api-ms-win-crt-filesystem-l1-1-0
_unlink
api-ms-win-crt-math-l1-1-0
acosf
api-ms-win-crt-time-l1-1-0
strftime
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
api-ms-win-crt-environment-l1-1-0
getenv
Sections
.text Size: - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 331KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 1.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.{:r Size: - Virtual size: 4.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.S2q Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.1<C Size: 7.8MB - Virtual size: 7.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 128B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ