Static task
static1
Behavioral task
behavioral1
Sample
d249e02e45e23ee1255860237aa8b50a97a5b416e07639d40bee173e2b5c9329.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d249e02e45e23ee1255860237aa8b50a97a5b416e07639d40bee173e2b5c9329.exe
Resource
win10v2004-20241007-en
General
-
Target
d249e02e45e23ee1255860237aa8b50a97a5b416e07639d40bee173e2b5c9329
-
Size
402KB
-
MD5
27b5d4d881637fc396da8c9704acaaee
-
SHA1
9e4979b5516a45c67c30b4f35d61374d3c0b5b1f
-
SHA256
d249e02e45e23ee1255860237aa8b50a97a5b416e07639d40bee173e2b5c9329
-
SHA512
006ed94fe4b75330928d85c39d21f419a384c0eb7f6cea1415e54a812edcca0c5efb8792870d41fc30304c28a254c52f38850b6fe78661bf97d5125072e1cfa9
-
SSDEEP
6144:+tpNYGkw3hgwIk0gYIez/b1BgL+z04mU4wHOpTiKf6eDSUjcKGGGGG:+tLYROhgk0hMHU4wHOpTitiFRGGGGG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d249e02e45e23ee1255860237aa8b50a97a5b416e07639d40bee173e2b5c9329
Files
-
d249e02e45e23ee1255860237aa8b50a97a5b416e07639d40bee173e2b5c9329.exe windows:4 windows x86 arch:x86
58da7289fc0e57e9969b549e468dee2a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
GetTempPathA
LoadLibraryA
GlobalFree
VirtualAlloc
GlobalAlloc
GetFileSize
GetModuleHandleW
LocalAlloc
WriteFile
CreateFileA
SetFilePointer
ReadFile
FindClose
GetLastError
FindNextFileA
FreeLibrary
EndUpdateResourceA
UpdateResourceA
SizeofResource
BeginUpdateResourceA
LockResource
LoadResource
MapViewOfFile
FlushViewOfFile
CreateFileMappingA
CopyFileA
FreeResource
FindResourceExA
Sleep
GetProcAddress
SetLastError
GetStringTypeA
LCMapStringW
LCMapStringA
MultiByteToWideChar
GetOEMCP
GetACP
GetCPInfo
HeapReAlloc
RtlUnwind
HeapCreate
HeapDestroy
GetFileType
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
GetStringTypeW
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetModuleFileNameA
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetVersion
GetCommandLineA
GetStartupInfoA
CreateMutexA
VirtualFree
GetProcessHeap
HeapAlloc
ExitProcess
CreateThread
CloseHandle
HeapFree
WaitForMultipleObjects
VirtualProtect
GetStdHandle
user32
CreateWindowExA
ShowWindow
UpdateWindow
LoadIconA
LoadCursorA
GetDC
PostQuitMessage
EndPaint
DrawTextA
GetClientRect
BeginPaint
DefWindowProcA
RegisterClassExA
GetIconInfo
GetMessageA
TranslateAcceleratorA
TranslateMessage
DispatchMessageA
LoadAcceleratorsA
IsWindow
IsWindowVisible
DrawIcon
CopyImage
ReleaseDC
DestroyIcon
CreateIconIndirect
CreateDialogParamA
EndDialog
LoadStringA
DialogBoxParamA
DestroyWindow
LoadImageA
gdi32
CreatePen
SelectObject
DeleteObject
EnumObjects
CreateSolidBrush
CreateDCA
GetObjectA
GetDIBits
CreateCompatibleBitmap
Rectangle
ole32
CoUninitialize
CoInitialize
pdh
PdhCollectQueryData
PdhAddCounterA
PdhOpenQueryA
Sections
.text Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 168KB - Virtual size: 169KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 13KB - Virtual size: 549KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.sdata Size: 167KB - Virtual size: 167KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.mss Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.msl Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.ems Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ead Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.efx Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.exx Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE