Static task
static1
Behavioral task
behavioral1
Sample
56e6402732f24dcd826e1a71a988d509ecbae18549950906451a70d8805843ba.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
56e6402732f24dcd826e1a71a988d509ecbae18549950906451a70d8805843ba.exe
Resource
win10v2004-20241007-en
General
-
Target
56e6402732f24dcd826e1a71a988d509ecbae18549950906451a70d8805843ba
-
Size
858KB
-
MD5
ba091a56b7ce8c36babcc1d453a0e834
-
SHA1
12c98e33c05dcfaed73d4d4923e3ae3b2a80c537
-
SHA256
56e6402732f24dcd826e1a71a988d509ecbae18549950906451a70d8805843ba
-
SHA512
a627170d19e707e5872cf5021ab4c6c331cc65e3700fd7e2f13e2457954134e54a2f31508b6317857e5996fc43213c883db92ff5766e2edb0b2ba3b5aaa15f52
-
SSDEEP
12288:xhVx2yi47NS0bTpUxkdierNiwRn3ms+hxX/zYilBbR4smE7re/9l78FOA:Hyyi4RSSTDKSmxPXrYilPfnU9l7z
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 56e6402732f24dcd826e1a71a988d509ecbae18549950906451a70d8805843ba
Files
-
56e6402732f24dcd826e1a71a988d509ecbae18549950906451a70d8805843ba.exe windows:4 windows x86 arch:x86
b76885c83ed0778a8cfa1a8aff7067d2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentThread
GetCurrentProcess
SetPriorityClass
lstrcatA
lstrcpyA
GetEnvironmentVariableA
GetShortPathNameA
GetModuleFileNameA
lstrlenA
SizeofResource
LockResource
LoadResource
FindResourceA
FreeLibrary
EnumResourceNamesA
LoadLibraryA
EndUpdateResourceA
UpdateResourceA
BeginUpdateResourceA
CloseHandle
GlobalFree
ReadFile
VirtualAlloc
GetFileSize
CreateFileA
SetThreadPriority
WriteFile
VirtualFree
DeleteFileA
WaitForSingleObject
CreateProcessA
GetCommandLineA
GetTempFileNameA
GetTempPathA
GetFileAttributesA
GetVersionExA
Process32Next
Process32First
CreateToolhelp32Snapshot
lstrcmpiA
OpenProcess
FindClose
FindNextFileA
FindFirstFileA
GetWindowsDirectoryA
GetSystemTime
GetVolumeInformationA
GetSystemDefaultLangID
GetComputerNameA
GetDriveTypeA
GetLogicalDrives
SetFilePointer
ExitProcess
user32
wsprintfA
psapi
EnumProcessModules
EnumProcesses
GetModuleFileNameExA
shell32
SHChangeNotify
ShellExecuteExA
ddraw
DirectDrawCreate
wininet
HttpSendRequestA
InternetSetOptionA
HttpQueryInfoA
InternetReadFile
InternetCloseHandle
HttpOpenRequestA
InternetOpenUrlA
InternetOpenA
InternetConnectA
urlmon
ObtainUserAgentString
mpr
WNetEnumResourceA
WNetOpenEnumA
WNetCloseEnum
msvcrt
_beginthreadex
??2@YAPAXI@Z
memset
_endthreadex
memcmp
free
realloc
malloc
memcpy
Sections
.data Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ