Static task
static1
Behavioral task
behavioral1
Sample
42109219250a1000c01f3079a328d861c216182a26eb290bb2614e0646f4519bN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
42109219250a1000c01f3079a328d861c216182a26eb290bb2614e0646f4519bN.exe
Resource
win10v2004-20240802-en
General
-
Target
42109219250a1000c01f3079a328d861c216182a26eb290bb2614e0646f4519bN
-
Size
15KB
-
MD5
00f31438642b6c4f23abee497b2fb080
-
SHA1
ca78f5d3eb15bb1c485dab47083603be2e045785
-
SHA256
42109219250a1000c01f3079a328d861c216182a26eb290bb2614e0646f4519b
-
SHA512
29a453c2b545cbfb02c03d9b1784b0277f014da5a6b99552c709d9dd8e02048fbae599ea49b9e020d83c29023feaed7f14c1954ac18bc4e35aca8f0a2a898e27
-
SSDEEP
384:+g5kctReKIO+7N90KsPIWyDmyCkL4SWK:r6ctREVN90KsPIWy6yCb
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 42109219250a1000c01f3079a328d861c216182a26eb290bb2614e0646f4519bN
Files
-
42109219250a1000c01f3079a328d861c216182a26eb290bb2614e0646f4519bN.exe windows:4 windows x86 arch:x86
1b60b2f93c0fea16c7e66c9e0b5d662c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
GetCurrentProcess
GetProcessHeap
GetFileAttributesA
CloseHandle
GetProcAddress
SetFilePointer
CreateFileA
lstrlenA
GetModuleFileNameA
PulseEvent
LoadLibraryA
lstrcpyA
CreateEventA
ExitProcess
WaitForSingleObject
SetEvent
WriteFile
ExitThread
GetVersionExA
CreateThread
GetTempPathA
ReadFile
lstrcatA
user32
DispatchMessageA
SetThreadDesktop
ShowWindow
PeekMessageA
CreateWindowExA
TranslateMessage
CreateDesktopA
MsgWaitForMultipleObjects
DestroyWindow
CharToOemA
wsprintfA
BeginPaint
CloseWindow
Sections
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ