Static task
static1
Behavioral task
behavioral1
Sample
84befd01e0c045e34cc5cd5e527bb1bcfff3d94bebabd200051eb3ec8a8d5871N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
84befd01e0c045e34cc5cd5e527bb1bcfff3d94bebabd200051eb3ec8a8d5871N.exe
Resource
win10v2004-20241007-en
General
-
Target
84befd01e0c045e34cc5cd5e527bb1bcfff3d94bebabd200051eb3ec8a8d5871N.exe
-
Size
436KB
-
MD5
33ea196a6eeff134accc2d5f00d8e1c0
-
SHA1
a943d9ffe1df76a1e967f089a1b39e1980fa4b6b
-
SHA256
84befd01e0c045e34cc5cd5e527bb1bcfff3d94bebabd200051eb3ec8a8d5871
-
SHA512
5c499f4d30047c722575241d3fa04b34b7f81fe37bf67e7eb7c9d914fec5d26eef65b4e856eee1d48e22b408a013dd1d037ae31f1b34f92ed7e03fea079faa1d
-
SSDEEP
6144:3DWK6Ofb9pgHR0oUiUTbt7Sb6yRYMvMyjVCkeSAOhO17BV+UdvrEFp7hKuj:zWK6SQx0oUiU3t7CZECVCYIBjvrEH73
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 84befd01e0c045e34cc5cd5e527bb1bcfff3d94bebabd200051eb3ec8a8d5871N.exe
Files
-
84befd01e0c045e34cc5cd5e527bb1bcfff3d94bebabd200051eb3ec8a8d5871N.exe.exe windows:5 windows x86 arch:x86
df0a9335cc98fa53e98847157895eff3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
dinput8
DirectInput8Create
dsound
ord11
ddraw
DirectDrawCreateEx
winmm
timeBeginPeriod
timeGetTime
mmioOpenA
mmioDescend
mmioRead
mmioAscend
mmioSeek
mmioGetInfo
mmioAdvance
mmioSetInfo
kernel32
GetModuleHandleA
CloseHandle
PurgeComm
SetCommMask
ClearCommError
GetOverlappedResult
GetLastError
WriteFile
ReadFile
WaitCommEvent
CreateEventA
CreateThread
SetCommTimeouts
SetCommState
GetCommState
CreateFileA
SetFilePointer
MultiByteToWideChar
WideCharToMultiByte
GetTickCount
LeaveCriticalSection
EnterCriticalSection
CreateDirectoryA
InitializeCriticalSection
SetLocalTime
GetLocalTime
SetEvent
WaitForSingleObject
ResetEvent
GetCommMask
GetCommTimeouts
GetCurrentProcess
Sleep
DeleteFileA
GetPrivateProfileStringA
GetDriveTypeA
GetStringTypeW
GetStringTypeA
GetLocaleInfoA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetProcessHeap
SetEndOfFile
LCMapStringW
LCMapStringA
GetTimeZoneInformation
FlushFileBuffers
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
LoadLibraryA
SetStdHandle
GetFullPathNameA
InterlockedDecrement
InitializeCriticalSectionAndSpinCount
HeapSize
GetCurrentProcessId
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetConsoleMode
GetConsoleCP
CompareStringA
CompareStringW
GetCurrentThreadId
HeapFree
HeapAlloc
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
FindFirstFileA
RaiseException
RtlUnwind
SetEnvironmentVariableA
GetCurrentDirectoryA
GetSystemTimeAsFileTime
GetFileInformationByHandle
PeekNamedPipe
GetFileType
GetCommandLineA
GetStartupInfoA
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapCreate
VirtualFree
DeleteCriticalSection
VirtualAlloc
HeapReAlloc
GetModuleHandleW
GetProcAddress
ExitProcess
GetStdHandle
GetModuleFileNameA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
SetHandleCount
user32
DispatchMessageA
PostQuitMessage
ChangeDisplaySettingsA
PostMessageA
SetRect
UpdateWindow
ShowWindow
CreateWindowExA
GetAsyncKeyState
LoadStringA
ShowCursor
PeekMessageA
GetMessageA
TranslateMessage
MessageBoxA
LoadIconA
LoadCursorA
RegisterClassExA
DefWindowProcA
ExitWindowsEx
SystemParametersInfoA
gdi32
CreateFontA
DeleteObject
advapi32
LookupPrivilegeValueA
OpenProcessToken
AdjustTokenPrivileges
ws2_32
htons
Sections
.text Size: 280KB - Virtual size: 280KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 25KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ