Static task
static1
Behavioral task
behavioral1
Sample
438ac05afd9cdee0a3008494949199d548a8c42d2e8a8bd159976a88a70f9f44.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
438ac05afd9cdee0a3008494949199d548a8c42d2e8a8bd159976a88a70f9f44.exe
Resource
win10v2004-20241007-en
General
-
Target
438ac05afd9cdee0a3008494949199d548a8c42d2e8a8bd159976a88a70f9f44
-
Size
177KB
-
MD5
3029fb103e14ad87762dd35d16c58f78
-
SHA1
f657d5fac192ca3f6f2650995db12d82d5a3d37d
-
SHA256
438ac05afd9cdee0a3008494949199d548a8c42d2e8a8bd159976a88a70f9f44
-
SHA512
3844d8dc0461561e60115f9f6b5fc573976d45fef6dfb83335745d948788c53867af4ed963e54e0a2f413f6ecaab7e82a14d4892b3359edaa4cb50c7f11c1958
-
SSDEEP
3072:YmX+4E31UUnIkiczVmcynqIzvLVMaq6rdXVoFRzm:k4E31UUnIk5s1zvLq6r9t
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 438ac05afd9cdee0a3008494949199d548a8c42d2e8a8bd159976a88a70f9f44
Files
-
438ac05afd9cdee0a3008494949199d548a8c42d2e8a8bd159976a88a70f9f44.exe windows:5 windows x86 arch:x86
0790c330313151ba48758a7b94dd7e1a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
LoadLibraryA
ReadFile
VirtualAlloc
CloseHandle
CreateDirectoryA
CreateFileA
FindClose
FindFirstFileA
FindNextFileA
GetDiskFreeSpaceA
GetFileSize
GetLastError
GetLocalTime
GetLocaleInfoA
SetEndOfFile
SetFilePointer
SystemTimeToFileTime
WriteFile
lstrcmpiA
lstrlenA
user32
LoadIconW
LoadCursorA
LoadIconA
CharPrevA
CheckDlgButton
CreateDialogParamA
DestroyWindow
DialogBoxParamA
DispatchMessageA
EndDialog
GetDesktopWindow
GetDlgItem
GetParent
GetWindowRect
IsDialogMessageA
IsDlgButtonChecked
LoadStringA
MessageBoxA
OffsetRect
PeekMessageA
SendMessageA
SetDlgItemTextA
SetFocus
SetForegroundWindow
SetWindowPos
ShowWindow
SystemParametersInfoA
TranslateMessage
msvcrt
_cexit
_controlfp
exit
_acmdln
Sections
.text Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text8 Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text7 Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text6 Size: 512B - Virtual size: 68B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text5 Size: 512B - Virtual size: 68B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 144KB - Virtual size: 143KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata2 Size: 512B - Virtual size: 100B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 170KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.htext Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE