Static task
static1
Behavioral task
behavioral1
Sample
f54fd3ba107e2d5507e10517a0a018d2e664e3d5da4f7022bbe6498911bdb00e.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
f54fd3ba107e2d5507e10517a0a018d2e664e3d5da4f7022bbe6498911bdb00e.exe
Resource
win10v2004-20241007-en
General
-
Target
f54fd3ba107e2d5507e10517a0a018d2e664e3d5da4f7022bbe6498911bdb00e
-
Size
86KB
-
MD5
9d75cf106a473db16592c0a7d73bcbed
-
SHA1
a6632776f64488f3f3e6544233b85c541cd7e28f
-
SHA256
f54fd3ba107e2d5507e10517a0a018d2e664e3d5da4f7022bbe6498911bdb00e
-
SHA512
df8d75027d4bca71ccbf0d45e958be2e43b238bc12cb299ac16e49d197827151382c6d1755241485ce0cf4d39ee93d2487c73ccfd32cebcca4eda3ba97866cf3
-
SSDEEP
192:C+OzRHB4PzHfuYpkVwHO6E5Yp1aiZ1K2sYyXF0me:C+Ozz4Pz/uYp65Yp1aiTK17S
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f54fd3ba107e2d5507e10517a0a018d2e664e3d5da4f7022bbe6498911bdb00e
Files
-
f54fd3ba107e2d5507e10517a0a018d2e664e3d5da4f7022bbe6498911bdb00e.exe windows:5 windows x86 arch:x86
8bacd03bbc7cdff0985aa85f801440c8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
wininet
InternetSetOptionW
HttpSendRequestW
InternetConnectW
InternetReadFile
HttpQueryInfoW
HttpOpenRequestW
InternetQueryOptionW
InternetOpenW
kernel32
HeapCreate
GetModuleFileNameW
DeleteFileW
CloseHandle
GetCurrentDirectoryW
GetTempPathW
lstrlenW
lstrcmpW
ExitProcess
GetFileSize
HeapAlloc
GetModuleHandleW
WriteFile
Sleep
ReadFile
CreateFileW
user32
wsprintfW
shell32
ShellExecuteW
Sections
.MPRESS1 Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.MPRESS2 Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE