Static task
static1
Behavioral task
behavioral1
Sample
417948b4a967ad2e6c5fddecee9dd6ffc9ebdc39eeccf12c3281dfcb5416d763.exe
Resource
win7-20241010-en
General
-
Target
417948b4a967ad2e6c5fddecee9dd6ffc9ebdc39eeccf12c3281dfcb5416d763.exe
-
Size
245KB
-
MD5
44965ed6a55c0b0f785d33ecd815d795
-
SHA1
17139d1d64240264113a1372d26c5b2243554dd3
-
SHA256
417948b4a967ad2e6c5fddecee9dd6ffc9ebdc39eeccf12c3281dfcb5416d763
-
SHA512
f1977665da167060ccf1dd6c94d776bc13c8f3fa21fcf29f9ebac10d57926fb13545e459a0725e8325a8bf15cb929acc8b06f9710931df08e498514709c30a47
-
SSDEEP
6144:7pkEWLxcJ2+XgbvRMdS7p6UMQgkZwgJqnHRZZ/8xuiqn:qE0cDXgbsSWQgkZj0HRZB8MLn
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 417948b4a967ad2e6c5fddecee9dd6ffc9ebdc39eeccf12c3281dfcb5416d763.exe
Files
-
417948b4a967ad2e6c5fddecee9dd6ffc9ebdc39eeccf12c3281dfcb5416d763.exe.exe windows:4 windows x86 arch:x86
47457efadcd7467d7ac4e9f427fee335
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
kernel32
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
oleaut32
SysFreeString
advapi32
RegQueryValueExA
user32
GetKeyboardType
gdi32
UnrealizeObject
version
VerQueryValueA
wsock32
WSACleanup
shell32
ShellExecuteExA
ole32
CoTaskMemFree
urlmon
URLDownloadToFileA
comctl32
_TrackMouseEvent
wininet
InternetOpenUrlA
winmm
waveInUnprepareHeader
netapi32
Netbios
ntdll
NtUnmapViewOfSection
NtQuerySystemInformation
gdiplus
GdipGetImageEncoders
shfolder
SHGetFolderPathA
ws2_32
WSAIoctl
msacm32
acmStreamUnprepareHeader
pstorec
PStoreCreateInstance
rasapi32
RasGetEntryDialParamsA
url
InetIsOffline
avicap32
capGetDriverDescriptionA
Sections
.text Size: 218KB - Virtual size: 744KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 26KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE