Static task
static1
Behavioral task
behavioral1
Sample
5de240159b639483fb3674e6289e946e7c304293.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5de240159b639483fb3674e6289e946e7c304293.exe
Resource
win10v2004-20241007-en
General
-
Target
5de240159b639483fb3674e6289e946e7c304293.exe
-
Size
1.1MB
-
MD5
a1699b125470c94380386d6c0cf106b3
-
SHA1
5de240159b639483fb3674e6289e946e7c304293
-
SHA256
d7db5171f51590f6eb1f7250eb75203b68ea0e9ba29a60457776338c5a9c9dc3
-
SHA512
02f1b13d1f3d20e01525be2c56aa7a6fb4008f8fc20ffe04b19fa2499d2b0f5ceff9e1347ed86e21d14d8bf321fc91f5ee918d4a3164f649bf6fd582d7cef152
-
SSDEEP
24576:f800kHPa2DfTNjx+mZCkt76f/24pN+XNqNG6hditW:00riKf9Ckt7c20+9qNxUW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5de240159b639483fb3674e6289e946e7c304293.exe
Files
-
5de240159b639483fb3674e6289e946e7c304293.exe.exe windows:4 windows x86 arch:x86
616d060f84174fbe550615d295f4ce51
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetLocaleInfoA
lstrcpyn
CreateNamedPipeA
GetEnvironmentVariableA
GetExitCodeThread
OpenEventW
GetLogicalDriveStringsA
CopyFileExW
SetPriorityClass
GetProcAddress
CreateMutexA
CreateMutexW
QueryPerformanceCounter
CreateThread
SetUnhandledExceptionFilter
OpenMutexW
GetExitCodeProcess
GlobalGetAtomNameA
GetFileTime
GetCalendarInfoA
MulDiv
CreateFileMappingW
CreateMailslotA
FreeResource
LocalFree
DeleteAtom
GetVolumeInformationA
RaiseException
AddAtomA
GlobalFindAtomW
RemoveDirectoryW
GlobalFindAtomA
CreateMailslotW
GetProcessHeaps
EndUpdateResourceA
CopyFileExA
CreateNamedPipeW
SleepEx
GetModuleHandleA
WaitForSingleObject
GetSystemDefaultLangID
SetEvent
TlsAlloc
SetCalendarInfoW
GetLastError
GetFileSize
lstrlen
DuplicateHandle
GetAtomNameW
GetStringTypeW
CreateFileA
user32
CheckMenuItem
GetDC
DefDlgProcW
BringWindowToTop
GetDlgItem
EnumWindows
PeekMessageW
SetCursor
GetWindowLongA
MessageBoxIndirectW
CreatePopupMenu
keybd_event
GetWindowTextLengthA
gdi32
CreateFontIndirectExA
CreatePolygonRgn
CreateDIBitmap
GetLogColorSpaceW
SetGraphicsMode
GdiGetBatchLimit
ScaleWindowExtEx
SelectObject
GetEnhMetaFileHeader
GetFontData
SetLayout
SetRectRgn
ExtSelectClipRgn
EnumFontFamiliesA
GetAspectRatioFilterEx
GetNearestPaletteIndex
PolylineTo
PatBlt
SelectClipRgn
advapi32
RegEnumValueW
RegReplaceKeyA
RegCreateKeyW
RegQueryValueA
RegCreateKeyExA
RegReplaceKeyW
RegCloseKey
shlwapi
PathGetArgsW
ChrCmpIA
StrSpnW
PathAddBackslashW
PathIsUNCA
SHRegOpenUSKeyW
PathIsPrefixA
PathCompactPathExA
comctl32
FlatSB_SetScrollRange
InitCommonControls
winspool.drv
AddFormW
EnumMonitorsW
OpenPrinterW
GetJobW
DeleteMonitorA
EndDocPrinter
AddPrinterConnectionW
SetPrinterDataExW
inetcomm
MimeOleParseRfc822Address
MimeOleParseRfc822AddressW
HrGetAttachIcon
EssSecurityLabelEncodeEx
MimeOleGetDefaultCharset
MimeOleGetFileExtension
HrAttachDataFromFile
EssKeyExchPreferenceEncodeEx
EssSignCertificateDecodeEx
MimeOleSMimeCapGetHashAlg
EssKeyExchPreferenceDecodeEx
MimeOleGetCharsetInfo
MimeOleGetCertsFromThumbprints
Sections
.text Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.j Size: 1KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.nkytZ Size: 1024B - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.N Size: 3KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.fc Size: 1KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.s Size: 2KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.w Size: 2KB - Virtual size: 191KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 165KB - Virtual size: 165KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 1022B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ