Static task
static1
Behavioral task
behavioral1
Sample
59dabf8f3a79b8d563d69ab44b1adb19086085b4c4cc2f0dc79041af410dfc96.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
59dabf8f3a79b8d563d69ab44b1adb19086085b4c4cc2f0dc79041af410dfc96.exe
Resource
win10v2004-20241007-en
General
-
Target
59dabf8f3a79b8d563d69ab44b1adb19086085b4c4cc2f0dc79041af410dfc96
-
Size
247KB
-
MD5
e5f7a82cf06d5109b86eb066caf698be
-
SHA1
e5631b31a6266ea175e727cd3662086224ec67e8
-
SHA256
59dabf8f3a79b8d563d69ab44b1adb19086085b4c4cc2f0dc79041af410dfc96
-
SHA512
231e86b87bd4cea60cf6ee4e60488d720de14b33e684bc9beba77f7068c0ca4e5f7f32c106fb248b988cde7e66f8d81b3fe2e7d48dd12fbac7647a7f9800141e
-
SSDEEP
3072:uDBfj8EN+sQPblA7f4eJG6wvx+pzuARPm:uDl7f4e3m
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 59dabf8f3a79b8d563d69ab44b1adb19086085b4c4cc2f0dc79041af410dfc96
Files
-
59dabf8f3a79b8d563d69ab44b1adb19086085b4c4cc2f0dc79041af410dfc96.exe windows:4 windows x86 arch:x86
9c41c25231cf61be29421e7896f4c62d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CloseHandle
CompareFileTime
CompareStringW
CopyFileW
CreateDirectoryW
CreateFileW
FileTimeToSystemTime
FindClose
FindFirstFileW
FindNextFileW
FormatMessageW
GetCommandLineW
GetCurrentDirectoryW
GetDateFormatW
GetEnvironmentVariableW
GetFileAttributesW
GetFileTime
GetFullPathNameW
GetModuleHandleW
GetOEMCP
GetProcAddress
GetStdHandle
GetTickCount
GetTimeFormatW
HeapAlloc
HeapFree
HeapReAlloc
IsBadStringPtrW
LocalFree
ReadFile
SetFileAttributesW
SystemTimeToFileTime
WideCharToMultiByte
WriteConsoleW
WriteFile
lstrcmpW
ntdll
_vsnprintf
ucrtbase
__acrt_iob_func
__p___argc
__p___wargv
__stdio_common_vsprintf
_configure_wide_argv
_get_initial_wide_environment
_initialize_wide_environment
_set_app_type
_strdup
_wfopen
_wsplitpath
_wtol
exit
fclose
feof
fgetws
free
fwrite
getenv
malloc
memcmp
memcpy
memmove
strchr
strcmp
strcspn
strlen
toupper
wcschr
wcscpy
wcslen
wcsrchr
wcsstr
user32
CharUpperBuffW
LoadStringW
Sections
.text Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 60B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rodata Size: 4KB - Virtual size: 192B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.buildid Size: 4KB - Virtual size: 53B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
/4 Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 17KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 4KB - Virtual size: 50B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 136KB - Virtual size: 134KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 1004B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/14 Size: 4KB - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/29 Size: 4KB - Virtual size: 36B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/41 Size: 4KB - Virtual size: 20B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/55 Size: 4KB - Virtual size: 88B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/67 Size: 4KB - Virtual size: 56B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/80 Size: 4KB - Virtual size: 161B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/91 Size: 4KB - Virtual size: 158B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ