Static task
static1
Behavioral task
behavioral1
Sample
d59bd98f835885336e6733adbf8a43aeb10fbf1629936eee4988891ced4ac386N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d59bd98f835885336e6733adbf8a43aeb10fbf1629936eee4988891ced4ac386N.exe
Resource
win10v2004-20241007-en
General
-
Target
d59bd98f835885336e6733adbf8a43aeb10fbf1629936eee4988891ced4ac386N.exe
-
Size
73KB
-
MD5
79a94079460b7da993ef0264ee8f3780
-
SHA1
8251f6af71a94e5a49f65c3726f2411f6c7c1167
-
SHA256
d59bd98f835885336e6733adbf8a43aeb10fbf1629936eee4988891ced4ac386
-
SHA512
cf32dd0120667b2340bbb13fc1390e48e892195619f454eb8b99f6278734e0d2854039f01e6e2f11454cfae3c13e9d8f0851f649fc83f2f2f3fac9dfbcb88450
-
SSDEEP
1536:O7qvnKhWQtC3Izj6TrlDa2z6Ewd0zvPTQw9LBZR+d8V3zhb:eqvKztiIzj6xtDLBZR+d8Vj5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d59bd98f835885336e6733adbf8a43aeb10fbf1629936eee4988891ced4ac386N.exe
Files
-
d59bd98f835885336e6733adbf8a43aeb10fbf1629936eee4988891ced4ac386N.exe.exe windows:4 windows x86 arch:x86
b7b36544c7913d18eb11f60f9865553a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InitializeCriticalSection
DeleteCriticalSection
GetProcAddress
LoadLibraryA
LeaveCriticalSection
EnterCriticalSection
CloseHandle
WaitForSingleObject
lstrcpyA
InterlockedExchange
Sleep
WritePrivateProfileStringA
GetPrivateProfileStringA
SetThreadPriority
GetLastError
SetUnhandledExceptionFilter
CreateThread
GetModuleHandleA
GetStartupInfoA
user32
wsprintfA
MessageBoxA
shell32
ShellExecuteA
msvcrt
_exit
_controlfp
??3@YAXPAX@Z
memmove
ceil
_ftol
strstr
__CxxFrameHandler
??2@YAPAXI@Z
_CxxThrowException
sprintf
exit
strtok
_beginthreadex
fclose
fputs
fopen
rand
srand
fputc
_except_handler3
ftell
fseek
atoi
strchr
strncpy
strcspn
??1type_info@@UAE@XZ
__dllonexit
_onexit
fgetc
_XcptFilter
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
ws2_32
htons
gethostbyname
socket
ntohs
recv
closesocket
connect
send
inet_addr
WSACleanup
sendto
WSAStartup
htonl
gethostname
inet_ntoa
setsockopt
select
Sections
.data Size: 55KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ex_cod Size: 6KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ex_rsc Size: 10KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ