Static task
static1
Behavioral task
behavioral1
Sample
b0a06da97a82472191b1da25586ab364213143a06d411bc3a5c3061025422dd4N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b0a06da97a82472191b1da25586ab364213143a06d411bc3a5c3061025422dd4N.exe
Resource
win10v2004-20241007-en
General
-
Target
b0a06da97a82472191b1da25586ab364213143a06d411bc3a5c3061025422dd4N.exe
-
Size
211KB
-
MD5
6d261f53dd3be723c5a7f568a5d103f0
-
SHA1
ca2bb9b639ed188910bca38cf9c68f5739e88b05
-
SHA256
b0a06da97a82472191b1da25586ab364213143a06d411bc3a5c3061025422dd4
-
SHA512
81910e51da1122f7763cc0f034887afb3ae215dc4fd43e92e4fabd821eeff059e532e633b5830412dc6551d6e10ffc70a5f85f2d09564c0c62a2184cbc8fe71b
-
SSDEEP
3072:Ag/T01/NkSp48GzFoMVZrjB2+4M9eOpssvSX4FzU5chdhGulEV5SCmGFkInV/0at:tErGjVqiFPGYrGZMCrCIn6aQdM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b0a06da97a82472191b1da25586ab364213143a06d411bc3a5c3061025422dd4N.exe
Files
-
b0a06da97a82472191b1da25586ab364213143a06d411bc3a5c3061025422dd4N.exe.exe windows:4 windows x86 arch:x86
3ce7105d1e904763c53a96a44fc006e6
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTempPathW
FreeResource
GlobalDeleteAtom
GetProcAddress
RemoveDirectoryA
ExitThread
GetFileAttributesA
GetDiskFreeSpaceW
lstrcmpA
GetDateFormatA
GetCurrentProcess
OpenSemaphoreA
CreateFileMappingW
ReadFile
SetCurrentDirectoryA
OpenMutexA
FindAtomA
GetStringTypeW
GetModuleHandleA
CreateFileA
CreateDirectoryW
GetCalendarInfoA
GetUserDefaultLCID
lstrcmpW
GetTempFileNameW
lstrcatA
GetEnvironmentStringsW
user32
CharNextA
GetClassNameW
SendMessageW
MessageBoxIndirectW
SetTimer
GetDlgItemTextA
EnumChildWindows
InsertMenuItemA
FlashWindow
IsMenu
EmptyClipboard
GetWindowTextA
InvalidateRect
GetMenuState
SetWindowRgn
UpdateWindow
AdjustWindowRect
DefWindowProcW
SetCursorPos
GetMenuStringA
GetMenuItemInfoA
UnregisterClassW
ChildWindowFromPoint
SetWindowPos
CreateWindowExW
GetMenuItemCount
LoadMenuIndirectW
CascadeWindows
GetClassInfoExW
AppendMenuA
InvalidateRgn
CreateMenu
SetFocus
GetClassInfoA
RegisterClassW
PostMessageW
DestroyMenu
MessageBeep
IsWindow
MessageBoxA
keybd_event
WaitForInputIdle
CreateDesktopA
OffsetRect
LoadBitmapA
gdi32
DeleteMetaFile
StrokeAndFillPath
CreateFontIndirectW
CreateDCA
PolylineTo
GetCharWidth32A
CloseMetaFile
GetROP2
CreateDCW
CreateColorSpaceA
RoundRect
AbortDoc
GetTextExtentExPointW
RectVisible
SetColorSpace
CreateScalableFontResourceW
ResizePalette
CopyEnhMetaFileA
ExtTextOutA
GetClipBox
SetTextJustification
advapi32
RegOpenKeyExA
RegQueryInfoKeyW
RegReplaceKeyW
comdlg32
ReplaceTextA
PageSetupDlgA
FindTextA
oleaut32
VarDecCmp
SafeArrayGetIID
SafeArraySetIID
VarR8FromStr
VarUI2FromI4
VarWeekdayName
wininet
GetUrlCacheGroupAttributeA
FtpGetFileW
FtpDeleteFileW
InternetAutodialCallback
RunOnceUrlCache
ShowCertificate
InternetWriteFileExW
InternetSetDialState
HttpSendRequestA
InternetGetCookieW
InternetShowSecurityInfoByURLW
InternetCloseHandle
InternetConnectW
inetcomm
EssReceiptRequestDecodeEx
EssReceiptRequestEncodeEx
EssReceiptEncodeEx
MimeOleSetCompatMode
Sections
.text Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.PNHk Size: 2KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.EC Size: 3KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.zuQj Size: 2KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.Kz Size: 2KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.m Size: 1KB - Virtual size: 218KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 170KB - Virtual size: 169KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ