Static task
static1
Behavioral task
behavioral1
Sample
d9ad0ed4bc5a64761993e5742b7f80a6b98a3eb13866d830eefe527d56b7b280.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d9ad0ed4bc5a64761993e5742b7f80a6b98a3eb13866d830eefe527d56b7b280.exe
Resource
win10v2004-20241007-en
General
-
Target
d9ad0ed4bc5a64761993e5742b7f80a6b98a3eb13866d830eefe527d56b7b280
-
Size
172KB
-
MD5
836f47db0811046178129bbe3097aa7d
-
SHA1
a63d6916c8e663e80f76c51b389a3c7cec60d49c
-
SHA256
d9ad0ed4bc5a64761993e5742b7f80a6b98a3eb13866d830eefe527d56b7b280
-
SHA512
3f1c1ab2b2f12ed6ee11ebfb983c4a52e96e9598310dc6bb706795442082a5037a4b79d15912bf52e3ac0062483bee6ba0d1446177f142a7888a2343b4029bae
-
SSDEEP
3072:d14mOxrKFNZYhrgtRFuV2DDbuiTf3hPsOraS87FYqjTZbn4TGh:dnYWYhrgtRo6DSiTf3hPswa1TZjxh
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d9ad0ed4bc5a64761993e5742b7f80a6b98a3eb13866d830eefe527d56b7b280
Files
-
d9ad0ed4bc5a64761993e5742b7f80a6b98a3eb13866d830eefe527d56b7b280.exe windows:5 windows x86 arch:x86
0ae6c4a958da08e71c3cb7642289c223
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcessHeap
GetModuleFileNameW
GetLastError
WaitForSingleObject
DeleteFileA
HeapFree
HeapAlloc
GetCommandLineW
LocalFree
GetVersionExA
LocalAlloc
LoadLibraryA
FreeLibrary
GetModuleHandleA
GetProcAddress
GetTempPathA
GetCurrentProcessId
GetModuleFileNameA
GetVersionExW
Sleep
GlobalFindAtomA
ExpandEnvironmentStringsA
GetCurrentProcess
GlobalAddAtomA
SetErrorMode
lstrcpynA
CloseHandle
ExitProcess
GetTickCount
SwitchToThread
Module32Next
VirtualProtectEx
Module32First
GetExitCodeProcess
CreateRemoteThread
GetTempFileNameA
SetFileAttributesA
GetThreadContext
CreateFileA
SetThreadContext
Process32First
VirtualFree
OpenProcess
TerminateThread
CreateProcessA
TerminateProcess
FlushInstructionCache
GetShortPathNameA
SetCurrentDirectoryA
FindFirstFileA
GetHandleInformation
VirtualAlloc
VirtualAllocEx
FindClose
Process32Next
FindNextFileA
VirtualProtect
GetCurrentDirectoryA
CreateToolhelp32Snapshot
WriteProcessMemory
ResumeThread
CreateThread
SetPriorityClass
GetCurrentThread
WriteFile
GetBinaryTypeA
ReadFile
SetThreadPriority
GetFileSizeEx
CopyFileA
user32
wsprintfW
DestroyWindow
keybd_event
GetMessageA
SetTimer
RegisterClassExA
PostQuitMessage
KillTimer
TranslateMessage
CreateWindowExA
DefWindowProcA
FlashWindow
DispatchMessageA
UpdateWindow
WaitForInputIdle
ShowWindow
shell32
SHGetFolderPathW
ShellExecuteExW
SHGetFolderPathA
ShellExecuteExA
ole32
CoInitializeEx
CoUninitialize
psapi
GetModuleBaseNameW
shlwapi
PathAppendW
PathFindFileNameA
StrStrIA
PathFileExistsA
PathAddBackslashA
SHGetValueA
StrStrNIW
PathAddExtensionA
PathIsDirectoryA
PathCombineA
ntdll
ZwSetInformationThread
RtlImageNtHeader
_stricmp
ZwClose
ZwUnmapViewOfSection
memset
_alloca_probe
strstr
_snprintf
ZwOpenProcess
RtlUnwind
advapi32
CryptGetHashParam
CryptAcquireContextA
CryptCreateHash
CryptDestroyHash
CryptHashData
OpenProcessToken
GetSidSubAuthority
GetSidSubAuthorityCount
GetTokenInformation
RegSetValueExA
RegCreateKeyA
RegOpenKeyExA
RegFlushKey
RegCloseKey
CryptReleaseContext
version
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
wintrust
WinVerifyTrust
Sections
.text Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 149KB - Virtual size: 151KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ