Static task
static1
Behavioral task
behavioral1
Sample
dee654f3cf65f4d57fdc0481a0e6d422ba189d9869858919c5efd2495e4a8a33N.exe
Resource
win7-20240903-en
General
-
Target
dee654f3cf65f4d57fdc0481a0e6d422ba189d9869858919c5efd2495e4a8a33N.exe
-
Size
140KB
-
MD5
e47f3d3e6378b8bdf2db57b38522abb0
-
SHA1
8f330749b3acebf4395b008f96d8283360f2baf3
-
SHA256
dee654f3cf65f4d57fdc0481a0e6d422ba189d9869858919c5efd2495e4a8a33
-
SHA512
a2ad036d29e8c4b30148b50ea9bce30b60f513e1b6d7e33f111282b09c3d26f6f2c8cf1c98a4bfa3eab23a8a3c4066a630bd3ad0f7ebdcfae5c0f83d7b6258e2
-
SSDEEP
3072:nlOx/1iOCor2lQBV+UdE+rECWp7hKnHOb9:Q/xCSBV+UdvrEFp7hKnHOb9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource dee654f3cf65f4d57fdc0481a0e6d422ba189d9869858919c5efd2495e4a8a33N.exe
Files
-
dee654f3cf65f4d57fdc0481a0e6d422ba189d9869858919c5efd2495e4a8a33N.exe.exe windows:4 windows x86 arch:x86
312d98b1ac429a8ece86f8f60c2cbe74
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42
ord521
ord6055
ord4078
ord1776
ord4407
ord5241
ord2385
ord5163
ord6374
ord4353
ord5290
ord3798
ord4837
ord4441
ord2648
ord2055
ord6376
ord3749
ord5065
ord1727
ord5261
ord2446
ord2124
ord5277
ord2982
ord3147
ord3259
ord4465
ord3136
ord6307
ord2985
ord3081
ord2976
ord3402
ord3830
ord3831
ord3825
ord3079
ord4080
ord4627
ord4424
ord3742
ord818
ord567
ord2077
ord6442
ord1247
ord1233
ord1105
ord1575
ord537
ord3663
ord2841
ord2107
ord5450
ord5440
ord6383
ord6394
ord533
ord798
ord2449
ord2060
ord287
ord6139
ord610
ord4335
ord1638
ord605
ord278
ord966
ord1971
ord5478
ord5796
ord4919
ord4975
ord4863
ord4447
ord4411
ord2031
ord5481
ord5810
ord1791
ord860
ord5683
ord4129
ord858
ord3811
ord2820
ord2818
ord2827
ord2915
ord803
ord540
ord543
ord3584
ord823
ord348
ord1270
ord538
ord800
ord3262
ord825
msvcrt
_controlfp
__CxxFrameHandler
_purecall
printf
_mbscmp
__dllonexit
_onexit
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
__p___initenv
exit
_XcptFilter
_exit
?terminate@@YAXXZ
_except_handler3
kernel32
WaitForSingleObject
CancelIo
DeviceIoControl
InterlockedExchangeAdd
CreateFileA
GetLastError
CreateEventA
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetModuleFileNameA
Sleep
GetVersionExA
ResumeThread
SuspendThread
SetThreadPriority
CreateDirectoryA
InterlockedExchange
GetModuleHandleA
GetCommandLineA
CloseHandle
SetEvent
ResetEvent
user32
GetMessageA
DispatchMessageA
TranslateMessage
PostThreadMessageA
EnableWindow
advapi32
RegisterServiceCtrlHandlerA
SetServiceStatus
RegQueryValueExA
RegOpenKeyExA
RegSetValueExA
RegCloseKey
QueryServiceStatus
StartServiceA
ChangeServiceConfig2A
ControlService
OpenServiceA
DeleteService
OpenSCManagerA
CreateServiceA
CloseServiceHandle
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
StartServiceCtrlDispatcherA
wsock32
WSAGetLastError
listen
closesocket
shutdown
Sections
.text Size: 36KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ