Static task
static1
Behavioral task
behavioral1
Sample
d1cad2d68060b31444cb6cd04ed6233eee8bfa6e694784ce5640b0b3928ab3c9N.exe
Resource
win7-20241010-en
General
-
Target
d1cad2d68060b31444cb6cd04ed6233eee8bfa6e694784ce5640b0b3928ab3c9N
-
Size
552KB
-
MD5
2692d319a3b52e1da132786848c288e0
-
SHA1
e3554b5406393a977d39eb9ec666a28687eef4f7
-
SHA256
d1cad2d68060b31444cb6cd04ed6233eee8bfa6e694784ce5640b0b3928ab3c9
-
SHA512
09c5782c472333eea0f00d248769da838095155725de1c8d019b6c0791e5ee7dad15dc887ebbf70fd8f7927c7d6296eb2266a0a7aabdc78a8c10e1ee537ecc95
-
SSDEEP
12288:R32kYn9YFZBsws0rwfQpP9p/yFUk6l6X3cWCauQWannR8fy:RGk69IS0rw4pP9p416QMaBnRCy
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d1cad2d68060b31444cb6cd04ed6233eee8bfa6e694784ce5640b0b3928ab3c9N
Files
-
d1cad2d68060b31444cb6cd04ed6233eee8bfa6e694784ce5640b0b3928ab3c9N.exe windows:5 windows x86 arch:x86
23109572f7167cc005488e478672dca2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetModuleHandleA
GetProcAddress
advapi32
GetAce
comctl32
ImageList_Remove
comdlg32
GetOpenFileNameW
gdi32
LineTo
iphlpapi
IcmpSendEcho
mpr
WNetUseConnectionW
ole32
CoGetObject
oleaut32
LoadTypeLibEx
psapi
GetProcessMemoryInfo
shell32
DragFinish
user32
GetDC
userenv
LoadUserProfileW
uxtheme
IsThemeActive
version
VerQueryValueW
wininet
FtpOpenFileW
winmm
timeGetTime
wsock32
WSACleanup
Sections
.MPRESS1 Size: 485KB - Virtual size: 1.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.MPRESS2 Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 62KB - Virtual size: 62KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE