Static task
static1
Behavioral task
behavioral1
Sample
a57ab191f2ce1ac537d14e952ca6cdc557ed5bb910ba2968b0cb16709a9e1016N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a57ab191f2ce1ac537d14e952ca6cdc557ed5bb910ba2968b0cb16709a9e1016N.exe
Resource
win10v2004-20241007-en
General
-
Target
a57ab191f2ce1ac537d14e952ca6cdc557ed5bb910ba2968b0cb16709a9e1016N
-
Size
328KB
-
MD5
29020857a9277b42cb347128fc808430
-
SHA1
db56e882fa5ceccfaf66fc54b876852ae05d4bd0
-
SHA256
a57ab191f2ce1ac537d14e952ca6cdc557ed5bb910ba2968b0cb16709a9e1016
-
SHA512
30d5d4152454fec5d2d0b39726d956d28aa4fc43946818d50a3d8270bf442cceaf028e77eec8fdcadccdf8d53b7a31043190c5346301151c9f970fa91f07326e
-
SSDEEP
6144:K67Djb8F4qkURCdPX9sUKGv56e437wqT5eCOCI2qW216T:KE78FQbdHKJ737wS5e1/W
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a57ab191f2ce1ac537d14e952ca6cdc557ed5bb910ba2968b0cb16709a9e1016N
Files
-
a57ab191f2ce1ac537d14e952ca6cdc557ed5bb910ba2968b0cb16709a9e1016N.exe windows:4 windows x86 arch:x86
7673d58e9878a269c2fe3ec6172ec893
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCloseKey
RegCreateKeyExW
RegDeleteKeyW
RegDeleteValueW
RegEnumKeyExW
RegOpenKeyExW
RegQueryValueExW
RegSetValueExW
shell32
ShellExecuteW
ShellExecuteExW
kernel32
FileTimeToLocalFileTime
FileTimeToSystemTime
FormatMessageW
GetComputerNameW
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetDateFormatW
GetLastError
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleW
GetProcAddress
GetSystemTimeAsFileTime
GetSystemWindowsDirectoryW
GetTickCount
GlobalAlloc
GlobalFree
GlobalLock
GlobalUnlock
InitializeCriticalSection
InterlockedDecrement
InterlockedIncrement
IsBadReadPtr
LoadLibraryA
LoadLibraryW
LocalAlloc
LocalFree
LocalReAlloc
MultiByteToWideChar
OutputDebugStringA
DisableThreadLibraryCalls
QueryPerformanceCounter
SetLastError
SetUnhandledExceptionFilter
TerminateProcess
UnhandledExceptionFilter
WideCharToMultiByte
WriteFile
lstrcmpiW
lstrcpyW
lstrlenW
CloseHandle
CreateFileW
DeleteCriticalSection
OutputDebugStringW
user32
GetWindowLongW
InsertMenuItemW
LoadBitmapW
LoadCursorW
LoadIconW
LoadImageW
LoadStringW
MessageBoxW
PostMessageW
RegisterClipboardFormatW
ReleaseDC
SendDlgItemMessageW
GetParent
SetCursor
SetDlgItemTextW
SetFocus
SetWindowLongW
SetWindowTextW
SystemParametersInfoW
WinHelpW
wsprintfW
EndDialog
EnableWindow
DialogBoxParamW
GetDlgItemTextA
GetDlgItem
SendMessageW
GetDC
comctl32
PropertySheetW
CreatePropertySheetPageW
crypt32
CertDuplicateCertificateContext
CertDuplicateStore
CertEnumCertificatesInStore
CertEnumSystemStore
CertFindCRLInStore
CertFreeCRLContext
CertFreeCertificateContext
CertGetCertificateContextProperty
CertGetEnhancedKeyUsage
CertGetNameStringW
CertOpenStore
CertSaveStore
CryptDecodeObject
CryptEncodeObject
CryptEnumOIDInfo
CryptFindOIDInfo
CryptQueryObject
CertDeleteCertificateFromStore
CertControlStore
CertCloseStore
CertAddCertificateContextToStore
gdi32
GetDeviceCaps
DeleteObject
CreateFontIndirectW
rpcrt4
UuidCreate
UuidToStringW
RpcStringFreeW
Sections
.text Size: 60KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 116KB - Virtual size: 116KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 112KB - Virtual size: 1.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ