Static task
static1
Behavioral task
behavioral1
Sample
522b9ea7e1f0455b050f4e71ae5b8da5d884733df7a5f1cf65b819d2e0156426N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
522b9ea7e1f0455b050f4e71ae5b8da5d884733df7a5f1cf65b819d2e0156426N.exe
Resource
win10v2004-20240802-en
General
-
Target
522b9ea7e1f0455b050f4e71ae5b8da5d884733df7a5f1cf65b819d2e0156426N
-
Size
78KB
-
MD5
ea0d95429b2b8d79cd5c488b7edf2920
-
SHA1
5bcb69e9e2522c561efea9f47a7f081ad3a951b4
-
SHA256
522b9ea7e1f0455b050f4e71ae5b8da5d884733df7a5f1cf65b819d2e0156426
-
SHA512
e1660b5d8da04b1f3507f3c1028c69bdba75635cfcec9768a980ca282984d5ccbcd54e4a7ffd1586e6d23bad808d63f95d7ef8cfb5d43ce7da18f5cac0040056
-
SSDEEP
768:zXS6Lnze1gshn5ew/QuBdL/4Ckir4SWeq3HwFdkt+Afs2DBnoFBgFpm5XkfIT9ze:TSSnze1gsJ55n/4CkOwwF+bhos2RozJ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 522b9ea7e1f0455b050f4e71ae5b8da5d884733df7a5f1cf65b819d2e0156426N
Files
-
522b9ea7e1f0455b050f4e71ae5b8da5d884733df7a5f1cf65b819d2e0156426N.exe windows:4 windows x86 arch:x86
bb8a672644c54cc80e980f3e174cf92c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CopyFileA
IsDBCSLeadByte
WriteFile
ReadFile
GetTempFileNameA
GetTempPathA
DeleteFileA
SetFileAttributesA
FindClose
FindNextFileA
FindFirstFileA
SetEndOfFile
SetFilePointer
GetComputerNameA
SetFileTime
GetTickCount
CreateProcessA
GetSystemDirectoryA
GetCurrentProcess
GetVersionExA
GetVersion
WaitForSingleObject
GetCommandLineA
ExpandEnvironmentStringsA
GetDriveTypeA
CreateThread
MultiByteToWideChar
WideCharToMultiByte
GetCurrentProcessId
LocalAlloc
LocalFree
GetLastError
GetLocalTime
UnmapViewOfFile
FreeLibrary
CreateFileA
GetFileSize
CreateFileMappingA
MapViewOfFile
Process32First
Process32Next
GetModuleFileNameA
CreateToolhelp32Snapshot
Module32First
OpenProcess
ReadProcessMemory
TerminateProcess
Sleep
CloseHandle
LoadLibraryA
GetProcAddress
GetFileTime
SetStdHandle
HeapReAlloc
VirtualAlloc
GetStringTypeW
GetStringTypeA
RtlUnwind
VirtualFree
HeapCreate
HeapDestroy
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
GetModuleHandleA
GetStartupInfoA
ExitProcess
GetCPInfo
GetACP
GetOEMCP
LCMapStringA
LCMapStringW
HeapFree
HeapAlloc
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
FlushFileBuffers
advapi32
StartServiceCtrlDispatcherA
LookupPrivilegeValueA
AdjustTokenPrivileges
RegCreateKeyA
RegSetValueExA
RegQueryValueExA
StartServiceA
RegConnectRegistryA
OpenProcessToken
GetTokenInformation
AllocateAndInitializeSid
EqualSid
FreeSid
RegisterServiceCtrlHandlerA
OpenServiceA
SetServiceStatus
OpenSCManagerA
CreateServiceA
CloseServiceHandle
RegEnumValueA
RegDeleteValueA
RegOpenKeyA
RegEnumKeyA
RegCloseKey
ws2_32
gethostbyname
closesocket
WSACleanup
send
htons
connect
WSAGetLastError
WSAStartup
socket
recv
mpr
WNetOpenEnumA
WNetEnumResourceA
WNetCloseEnum
Sections
.text Size: 48KB - Virtual size: 45KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 532KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ