Static task
static1
Behavioral task
behavioral1
Sample
864002315e536661b854caf916935ded11148990dc160834b0a306c73485c955N.exe
Resource
win7-20241010-en
General
-
Target
864002315e536661b854caf916935ded11148990dc160834b0a306c73485c955N.exe
-
Size
780KB
-
MD5
0c8eccdbefc96776c9d8e219f9832340
-
SHA1
3db01ae1da1854a8ff8513eb4f342a72d274214f
-
SHA256
864002315e536661b854caf916935ded11148990dc160834b0a306c73485c955
-
SHA512
df0c99851c48dd205f0f896e0735ba4564afc0f99eec2d38951f13f689c597fff211e315cf9dc2b19625aab547b3b8df47edc5b8ff2fc2568d3eeaadc6044a7d
-
SSDEEP
24576:F0ZhDa7BatUBFM8su0ZjpXZN0FmEOGpYmh:FwWNFBFM8s9FpXHunh
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 864002315e536661b854caf916935ded11148990dc160834b0a306c73485c955N.exe
Files
-
864002315e536661b854caf916935ded11148990dc160834b0a306c73485c955N.exe.exe windows:4 windows x86 arch:x86
d031b2ae6d207dcf7f78782dfafac286
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileAttributesA
FormatMessageA
SetFileAttributesA
ReadFile
CreateFileA
SetFilePointer
GetSystemDefaultLangID
GetUserDefaultLangID
WriteFile
GetLastError
GetCurrentProcess
CopyFileA
ExitProcess
GetTempPathA
GetModuleFileNameA
GetModuleHandleA
GetCommandLineA
CreateProcessA
CloseHandle
CreateThread
CreateDirectoryA
IsDBCSLeadByte
GetSystemDirectoryA
GetWindowsDirectoryA
GetPrivateProfileStringA
GetExitCodeProcess
LoadLibraryA
GetProcAddress
FreeLibrary
WritePrivateProfileStringA
FindFirstFileA
FindNextFileA
FindClose
Sleep
RemoveDirectoryA
GetCurrentDirectoryA
GlobalFree
DeleteFileA
MultiByteToWideChar
WaitForSingleObject
GetDiskFreeSpaceA
GetTempFileNameA
GetFileType
HeapCreate
SetHandleCount
GetEnvironmentStringsW
GetStdHandle
GetEnvironmentStrings
FreeEnvironmentStringsW
GlobalAlloc
FreeEnvironmentStringsA
UnhandledExceptionFilter
TerminateProcess
HeapReAlloc
VirtualAlloc
HeapFree
VirtualFree
FlushFileBuffers
HeapDestroy
LCMapStringW
LCMapStringA
WideCharToMultiByte
GetOEMCP
GetACP
GetCPInfo
GetVersion
GetStartupInfoA
HeapAlloc
RtlUnwind
GetStringTypeA
GetStringTypeW
SetStdHandle
user32
ScreenToClient
DialogBoxParamA
MessageBoxA
SendMessageA
FindWindowA
DispatchMessageA
PeekMessageA
UpdateWindow
InvalidateRect
ShowWindow
EnableWindow
GetDlgItem
ExitWindowsEx
CharPrevA
CharNextA
LoadStringA
wsprintfA
GetDesktopWindow
SetWindowPos
SendDlgItemMessageA
IsDlgButtonChecked
GetAsyncKeyState
GetDlgItemTextA
GetParent
LoadIconA
SetClassLongA
SetDlgItemTextA
CreateDialogParamA
EndDialog
GetWindowRect
SetWindowTextA
DestroyWindow
gdi32
DeleteObject
SetTextColor
GetNearestColor
SetBkColor
GetStockObject
advapi32
RegCreateKeyA
RegDeleteKeyA
RegDeleteValueA
RegOpenKeyA
RegCloseKey
RegSetValueExA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegQueryValueExA
RegOpenKeyExA
shell32
SHFileOperationA
SHGetSpecialFolderLocation
ShellExecuteA
SHBrowseForFolderA
SHGetMalloc
SHGetPathFromIDListA
ole32
CoInitialize
CoCreateInstance
OleInitialize
OleUninitialize
Sections
.text Size: 45KB - Virtual size: 45KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 10KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 145KB - Virtual size: 148KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE