Static task
static1
Behavioral task
behavioral1
Sample
962bdc841647bd5b3e48c1030080735bdd66d7e79fe0d8af63a5c550b7af6d38.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
962bdc841647bd5b3e48c1030080735bdd66d7e79fe0d8af63a5c550b7af6d38.exe
Resource
win10v2004-20241007-en
General
-
Target
962bdc841647bd5b3e48c1030080735bdd66d7e79fe0d8af63a5c550b7af6d38
-
Size
1.1MB
-
MD5
a4cdc0accbde9ed50528f7d3fea8bf8e
-
SHA1
f2c970b1e1289d43e5ebe5236d85b20cfe8701ce
-
SHA256
962bdc841647bd5b3e48c1030080735bdd66d7e79fe0d8af63a5c550b7af6d38
-
SHA512
40ac228779ef129980141639621742588b713220ea6f9ec4ba22b4d89f67cfe95520cf2c93ff51dc1330facd3bce1c09ac00c8572501f48da0c3d3b6bd019592
-
SSDEEP
12288:NUkSfx9YnN1GPmtzgUPpiZYrLuXI1fPgO:NZSfx94rGutQOf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 962bdc841647bd5b3e48c1030080735bdd66d7e79fe0d8af63a5c550b7af6d38
Files
-
962bdc841647bd5b3e48c1030080735bdd66d7e79fe0d8af63a5c550b7af6d38.exe windows:4 windows x86 arch:x86
58c86a853b4f22ff3fc4a989a757db3a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
GetFileSecurityW
GetSecurityDescriptorOwner
LookupAccountSidW
RegCloseKey
RegCreateKeyExW
RegDeleteKeyW
RegDeleteValueW
RegEnumKeyExW
RegOpenKeyExW
RegQueryValueExW
RegSetValueExW
kernel32
CloseHandle
CompareStringW
CopyFileW
CreateDirectoryW
CreateEventW
CreateFileW
CreateHardLinkW
CreateProcessW
CreateSymbolicLinkW
DeleteFileW
DeviceIoControl
DuplicateHandle
ExitProcess
FileTimeToLocalFileTime
FileTimeToSystemTime
FillConsoleOutputAttribute
FillConsoleOutputCharacterW
FindClose
FindFirstFileW
FindNextFileW
FormatMessageW
FreeEnvironmentStringsW
GetCommandLineW
GetConsoleCP
GetConsoleMode
GetConsoleOutputCP
GetConsoleScreenBufferInfo
GetCurrentDirectoryW
GetDateFormatW
GetDiskFreeSpaceExW
GetEnvironmentStringsW
GetEnvironmentVariableW
GetExitCodeProcess
GetFileAttributesExW
GetFileAttributesW
GetFileInformationByHandle
GetFullPathNameW
GetLocalTime
GetLocaleInfoW
GetModuleHandleW
GetOEMCP
GetProcAddress
GetShortPathNameW
GetStartupInfoW
GetStdHandle
GetSystemDirectoryW
GetTempFileNameW
GetTempPathW
GetTickCount
GetTimeFormatW
GetVolumeInformationW
HeapAlloc
HeapFree
HeapReAlloc
IsBadStringPtrW
LocalAlloc
LocalFree
MoveFileExW
MoveFileW
MultiByteToWideChar
ReadConsoleW
ReadFile
RemoveDirectoryW
SearchPathW
SetConsoleCtrlHandler
SetConsoleCursorPosition
SetConsoleMode
SetConsoleTextAttribute
SetConsoleTitleW
SetCurrentDirectoryW
SetEnvironmentVariableW
SetFileAttributesW
SetFilePointer
SetFilePointerEx
SetStdHandle
SetVolumeLabelW
VerifyConsoleIoHandle
WaitForSingleObject
WideCharToMultiByte
WriteConsoleW
WriteFile
lstrcmpW
lstrcmpiW
ntdll
RtlDosPathNameToNtPathName_U_WithStatus
RtlFreeUnicodeString
RtlGetVersion
_vsnprintf
shell32
FindExecutableW
SHFileOperationW
SHGetFileInfoW
ShellExecuteExW
ucrtbase
__acrt_iob_func
__p___argc
__p___wargv
__stdio_common_vsprintf
__stdio_common_vswprintf
_configure_wide_argv
_get_initial_wide_environment
_initialize_wide_environment
_pclose
_set_app_type
_strdup
_time32
_wcsdup
_wcsicmp
_wcslwr
_wcsnicmp
_wcsrev
_wcsupr
_wfopen
_wpopen
_wsplitpath
calloc
exit
fclose
feof
fgetws
free
fwrite
getenv
iswdigit
iswprint
iswspace
malloc
memchr
memcmp
memcpy
memmove
memset
qsort
rand
realloc
srand
strchr
strcmp
strcspn
strlen
towlower
towupper
wcscat
wcschr
wcscmp
wcscpy
wcscspn
wcslen
wcsncmp
wcspbrk
wcsrchr
wcsstr
wcstol
wcstoul
user32
CharNextExA
CharUpperBuffW
IsCharAlphaW
LoadStringW
wsprintfW
Sections
.text Size: 164KB - Virtual size: 161KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 136B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rodata Size: 4KB - Virtual size: 192B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.buildid Size: 4KB - Virtual size: 53B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
/4 Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 69KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 4KB - Virtual size: 48B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 800KB - Virtual size: 796KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/14 Size: 4KB - Virtual size: 64B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/29 Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/41 Size: 4KB - Virtual size: 342B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/55 Size: 4KB - Virtual size: 454B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/67 Size: 4KB - Virtual size: 56B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/80 Size: 4KB - Virtual size: 161B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/91 Size: 4KB - Virtual size: 454B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/107 Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/123 Size: 4KB - Virtual size: 39B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ