Static task
static1
Behavioral task
behavioral1
Sample
c4e1da05e45cc1a3bbecc42d68d0c9332166717d0068ddc2803f24e4a1734121N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c4e1da05e45cc1a3bbecc42d68d0c9332166717d0068ddc2803f24e4a1734121N.exe
Resource
win10v2004-20240802-en
General
-
Target
c4e1da05e45cc1a3bbecc42d68d0c9332166717d0068ddc2803f24e4a1734121N
-
Size
92KB
-
MD5
fe15871af72afbfed3b6c27f048be550
-
SHA1
6ea9725987dfdc83ea02b348ab5d634c6536d320
-
SHA256
c4e1da05e45cc1a3bbecc42d68d0c9332166717d0068ddc2803f24e4a1734121
-
SHA512
6f5020fe46c606357bd378fd328dfd304c0e2f31e4b169f949fa951935756d0b39d378c350d909469491a70de6afd610ea2fbe561e74c6f62f62358a38480ad5
-
SSDEEP
1536:moO/SKfiH85ooExq3Tl9TD8wGrwnDPmliKC1XZskt:k/piHiQq5wf4PmliKC1Wkt
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c4e1da05e45cc1a3bbecc42d68d0c9332166717d0068ddc2803f24e4a1734121N
Files
-
c4e1da05e45cc1a3bbecc42d68d0c9332166717d0068ddc2803f24e4a1734121N.exe windows:4 windows x86 arch:x86
6c783a65db27c4f68ed971b3a2b2b1fe
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InterlockedExchange
GetACP
GetLocaleInfoA
GetVersionExA
RaiseException
InitializeCriticalSection
DeleteCriticalSection
GetProcAddress
LoadLibraryA
lstrcpynA
GetLastError
CreateDirectoryA
GetTempFileNameA
GetTempPathA
GetModuleFileNameA
SizeofResource
LockResource
LoadResource
FindResourceA
lstrcpyA
lstrlenA
SetFilePointer
WriteFile
MultiByteToWideChar
InterlockedDecrement
TerminateProcess
SetUnhandledExceptionFilter
LocalFree
GetOEMCP
GetStringTypeW
GetStringTypeA
GetSystemInfo
VirtualProtect
GetCPInfo
IsBadCodePtr
IsBadReadPtr
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetStdHandle
LCMapStringW
WideCharToMultiByte
LCMapStringA
HeapSize
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
VirtualQuery
ExitProcess
RtlUnwind
HeapFree
GetSystemTimeAsFileTime
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
HeapReAlloc
HeapAlloc
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetCurrentProcess
user32
BeginPaint
DefWindowProcA
EndPaint
DestroyWindow
GetMessageA
DispatchMessageA
TranslateMessage
LoadCursorA
RegisterClassA
CreateWindowExA
ShowWindow
UpdateWindow
PostQuitMessage
SetTimer
shlwapi
StrStrA
PathAppendA
ole32
CoUninitialize
CoSetProxyBlanket
CoCreateInstance
CoInitializeSecurity
CoInitializeEx
oleaut32
VariantClear
VariantChangeType
VariantInit
SysFreeString
SysAllocString
Sections
.text Size: 60KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 235KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ