Static task
static1
Behavioral task
behavioral1
Sample
c1de3270530e33ea3603b28bb4fea541d1d2b80aa17872418f7c9f355c77eacfN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c1de3270530e33ea3603b28bb4fea541d1d2b80aa17872418f7c9f355c77eacfN.exe
Resource
win10v2004-20241007-en
General
-
Target
c1de3270530e33ea3603b28bb4fea541d1d2b80aa17872418f7c9f355c77eacfN
-
Size
357KB
-
MD5
42855eb1b38bbe499622e3d026b11910
-
SHA1
b698c24d021fef2c6f00bd51349990098839a2f7
-
SHA256
c1de3270530e33ea3603b28bb4fea541d1d2b80aa17872418f7c9f355c77eacf
-
SHA512
e041fae8ac078b47266e563b9efba81b9e3c5548c9448c2df6a87b931f173173f2abe90e602ec278a974ad1256bd8d4088558d80a8af2e8c3db8e75a848cd382
-
SSDEEP
6144:25+d09OHuyE1uRVRsMIdHISZ5KIqUNRFj:8+m9OHmuRV+MISSZ5Kn4RR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c1de3270530e33ea3603b28bb4fea541d1d2b80aa17872418f7c9f355c77eacfN
Files
-
c1de3270530e33ea3603b28bb4fea541d1d2b80aa17872418f7c9f355c77eacfN.exe windows:5 windows x86 arch:x86
80d951d4a8ff80b46e178f72a4b74c38
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateMutexW
GetStringTypeA
GlobalCompact
_llseek
BuildCommDCBAndTimeoutsA
EnumCalendarInfoW
VerSetConditionMask
GetConsoleAliasA
GetCurrentActCtx
SetDefaultCommConfigW
WriteConsoleInputA
SetEvent
GetModuleHandleW
EnumTimeFormatsW
InitializeCriticalSection
GetFirmwareEnvironmentVariableA
LoadLibraryW
GetFileAttributesA
TransactNamedPipe
WritePrivateProfileSectionW
TerminateProcess
IsDBCSLeadByte
lstrcmpW
GlobalUnlock
SetCurrentDirectoryA
GetCPInfoExW
SetLastError
GetProcAddress
PeekConsoleInputW
SearchPathA
OpenWaitableTimerA
GetProcessId
LocalAlloc
FindFirstVolumeMountPointW
GlobalGetAtomNameW
AddAtomA
WaitForMultipleObjects
EnumResourceTypesW
GetPrivateProfileSectionNamesA
FindNextFileA
FreeEnvironmentStringsW
SetCalendarInfoA
GetWindowsDirectoryW
DeleteFileW
EnumCalendarInfoExA
CopyFileExA
SetStdHandle
WriteConsoleW
GetLastError
MoveFileA
HeapAlloc
DeleteFileA
GetCommandLineA
HeapSetInformation
GetStartupInfoW
ExitProcess
DecodePointer
WriteFile
GetStdHandle
GetModuleFileNameW
HeapCreate
HeapDestroy
EncodePointer
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThreadId
GetCurrentThread
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCurrentProcess
EnterCriticalSection
LeaveCriticalSection
GetModuleFileNameA
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
FatalAppExitA
SetConsoleCtrlHandler
FreeLibrary
InterlockedExchange
GetLocaleInfoW
LCMapStringW
MultiByteToWideChar
GetStringTypeW
HeapFree
Sleep
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
RtlUnwind
HeapSize
IsProcessorFeaturePresent
HeapReAlloc
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetFilePointer
CloseHandle
CreateFileW
user32
LoadMenuW
Sections
.text Size: 84KB - Virtual size: 84KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 186KB - Virtual size: 39.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 85KB - Virtual size: 85KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ