Static task
static1
Behavioral task
behavioral1
Sample
345042648302c645996f4b78a112db8f11e72f97a8233b76ba42695e66b5d246N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
345042648302c645996f4b78a112db8f11e72f97a8233b76ba42695e66b5d246N.exe
Resource
win10v2004-20240802-en
General
-
Target
345042648302c645996f4b78a112db8f11e72f97a8233b76ba42695e66b5d246N
-
Size
136KB
-
MD5
ccb5a68f282cd76003551e22c4a56ab0
-
SHA1
a96cc5a29f6885752905604d47ab2b23d81ff8f5
-
SHA256
345042648302c645996f4b78a112db8f11e72f97a8233b76ba42695e66b5d246
-
SHA512
8ebf603e1810620ddf9ddb2ad1fcc807194eded4915dd8da4f647be9e99e42ea048a6d86fef760250e127fb980b9f90f229de4beff65858a2a7e0c265e6e1745
-
SSDEEP
3072:q99X4ATRtqdEY82XLT79O6W/0aC0VrETTrDFzH38dkjJZrU:E9ZtqqY82X3RObR4frxzsdkjJC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 345042648302c645996f4b78a112db8f11e72f97a8233b76ba42695e66b5d246N
Files
-
345042648302c645996f4b78a112db8f11e72f97a8233b76ba42695e66b5d246N.exe windows:1 windows x86 arch:x86
00e4b06d2c1b4e103fbc38d862ded364
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
Imports
crypt32
CryptBinaryToStringA
user32
DefWindowProcA
DestroyWindow
DispatchMessageA
DrawTextA
GetClientRect
GetCursorPos
GetDC
GetDlgItem
GetSystemMetrics
GetWindow
GetWindowLongA
GetWindowRect
InvalidateRect
LoadCursorA
LoadIconA
LoadStringA
MessageBoxA
PostMessageA
ReleaseDC
SendMessageA
SetWindowLongA
SetWindowTextA
ShowWindow
TranslateMessage
wsprintfA
CreateWindowExA
kernel32
CloseHandle
CreateFileA
DeleteFileA
GetCurrentProcess
GetCurrentThreadId
GetLastError
GetModuleHandleA
GetProcAddress
GetStartupInfoA
GetTickCount
GetVersionExA
LoadLibraryA
SetUnhandledExceptionFilter
TerminateProcess
UnhandledExceptionFilter
VirtualProtect
lstrcpyA
lstrlenA
MultiByteToWideChar
gdi32
DeleteDC
DeleteObject
GetDeviceCaps
RestoreDC
SaveDC
SelectObject
SetTextColor
GetObjectA
advapi32
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
RegCloseKey
Sections
AUTO Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DGROUP Size: 117KB - Virtual size: 117KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 184B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.htext Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE