Static task
static1
Behavioral task
behavioral1
Sample
dfa9729f02116e8e9ece9ad3a99c4cc9d9a7a432ef9fe8ebf1cfb1284481d0f6N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dfa9729f02116e8e9ece9ad3a99c4cc9d9a7a432ef9fe8ebf1cfb1284481d0f6N.exe
Resource
win10v2004-20240802-en
General
-
Target
dfa9729f02116e8e9ece9ad3a99c4cc9d9a7a432ef9fe8ebf1cfb1284481d0f6N
-
Size
592KB
-
MD5
b600195654565c676da7e50ede3186a0
-
SHA1
0521cec1c78355df2ef45b102e5a37fa32fb5c7f
-
SHA256
dfa9729f02116e8e9ece9ad3a99c4cc9d9a7a432ef9fe8ebf1cfb1284481d0f6
-
SHA512
4eb5e24f27fc0ca03994cf20face52875a5dc9c85a4a410ba751106badc136953a0830346fd46c88120c4a3e08b77a2d93d9fde762360043646b3c94b116b8e9
-
SSDEEP
12288:pVJTNjYGgpK/vnRsmH5Ckt73qfKrrzD89f24pWYbCXGah2JoHq1MGJlyw9hditWT:pVJTNjx+mZCkt76f/24pN+XNqNG6hdi4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource dfa9729f02116e8e9ece9ad3a99c4cc9d9a7a432ef9fe8ebf1cfb1284481d0f6N
Files
-
dfa9729f02116e8e9ece9ad3a99c4cc9d9a7a432ef9fe8ebf1cfb1284481d0f6N.exe windows:4 windows x64 arch:x64
8191ae96091e4649a25a1f643aee9c4c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
CloseHandle
CreatePipe
CreateProcessA
CreateThread
DeleteCriticalSection
DuplicateHandle
EnterCriticalSection
FindClose
FindFirstFileA
FindNextFileA
FormatMessageA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetFileAttributesA
GetFullPathNameA
GetLastError
GetStartupInfoA
GetStdHandle
GetSystemTimeAsFileTime
GetTickCount
InitializeCriticalSection
LeaveCriticalSection
QueryPerformanceCounter
ReadFile
RtlAddFunctionTable
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
SetEnvironmentVariableA
SetErrorMode
SetUnhandledExceptionFilter
Sleep
TerminateProcess
TlsGetValue
UnhandledExceptionFilter
VirtualProtect
VirtualQuery
WaitForMultipleObjects
WaitForSingleObject
WriteFile
lstrcatA
lstrcpyA
lstrlenA
msvcrt
__C_specific_handler
__getmainargs
__initenv
__iob_func
__lconv_init
__set_app_type
__setusermatherr
_acmdln
_amsg_exit
_cexit
_fmode
_initterm
_onexit
_strdup
_vsnprintf
abort
calloc
exit
fclose
fgets
fopen
fprintf
free
fwrite
isspace
malloc
memcpy
printf
puts
signal
strchr
strlen
strncmp
strncpy
strstr
vfprintf
user32
WaitForInputIdle
Sections
.text Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pdata Size: 1024B - Virtual size: 672B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xdata Size: 1024B - Virtual size: 544B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 4KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 104B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 568KB - Virtual size: 572KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE