Static task
static1
Behavioral task
behavioral1
Sample
9622985773330132aabb5d01f34e72e78390062e86a2a1c4d0113aef5ba470a3N.exe
Resource
win7-20240903-en
General
-
Target
9622985773330132aabb5d01f34e72e78390062e86a2a1c4d0113aef5ba470a3N.exe
-
Size
283KB
-
MD5
50dcf731699b37be03f91be86c617290
-
SHA1
db4769a1995569c09e57c1ae365d47563638d419
-
SHA256
9622985773330132aabb5d01f34e72e78390062e86a2a1c4d0113aef5ba470a3
-
SHA512
fd036efb4d2d71cb491aae3d7e214e94aae93792fd4da8ab11704cb50a390a07fdd4ea95bb4aee2c42dd0903556d7a23bbf81a1429f5531a32b8d8620f090825
-
SSDEEP
6144:ErPrgEYF57R69Um+nEY0kqk4PXzCPamiHtRNCI6X:ugXF9R6ym+skK07mKX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 9622985773330132aabb5d01f34e72e78390062e86a2a1c4d0113aef5ba470a3N.exe
Files
-
9622985773330132aabb5d01f34e72e78390062e86a2a1c4d0113aef5ba470a3N.exe.exe windows:4 windows x86 arch:x86
a720bc810f6a2bc8b444571c156db966
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetEnvironmentStringsW
VirtualAlloc
HeapSize
UnhandledExceptionFilter
FreeEnvironmentStringsW
GetOEMCP
AddAtomA
GetFileType
WriteFile
TlsSetValue
GetSystemInfo
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetACP
GetStdHandle
TlsGetValue
SetEndOfFile
VirtualFree
VirtualQuery
EnumResourceNamesA
TerminateProcess
SetLastError
GetStartupInfoA
lstrcatA
InterlockedExchange
TlsAlloc
GetEnvironmentStrings
TlsFree
GetCurrentProcess
SetHandleCount
HeapDestroy
FreeEnvironmentStringsA
GetModuleFileNameA
IsBadWritePtr
GetVersionExA
HeapCreate
GetCPInfo
GetLocaleInfoA
SetUnhandledExceptionFilter
shell32
SHGetFolderPathW
setupapi
CM_Get_Global_State
CMP_WaitNoPendingInstallEvents
SetupDiGetDeviceRegistryPropertyW
CM_Get_DevNode_Status
iphlpapi
GetIpAddrTable
mprapi
MprConfigServerConnect
MprConfigServerDisconnect
MprConfigGetFriendlyName
newdev
UpdateDriverForPlugAndPlayDevicesW
user32
CreateWindowExW
DestroyWindow
GetDlgItem
SendMessageA
EnumChildWindows
IsWindow
GetWindowThreadProcessId
Sections
.text Size: 142KB - Virtual size: 278KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 136KB - Virtual size: 136KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ