Static task
static1
Behavioral task
behavioral1
Sample
a3122701dab9b1b39995f5ee4650f8b8d4d363fd8dac84f3d777ca255fdc1015.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
a3122701dab9b1b39995f5ee4650f8b8d4d363fd8dac84f3d777ca255fdc1015.exe
Resource
win10v2004-20241007-en
General
-
Target
a3122701dab9b1b39995f5ee4650f8b8d4d363fd8dac84f3d777ca255fdc1015.exe
-
Size
212KB
-
MD5
a2c2173c7b0957707948947f74193691
-
SHA1
573be8b7ede22285db8c9c763228e7ab26d6e9cd
-
SHA256
a3122701dab9b1b39995f5ee4650f8b8d4d363fd8dac84f3d777ca255fdc1015
-
SHA512
c3fd2a4e5175b2a0af3757909b379ab025951b11c0d4923ec795950939f5895b0f46244976fb8515f20191b4d44e65995b1731c87a9301f6ac9860170ecf0649
-
SSDEEP
6144:yob34ERMS/H7YAVsobrVn5G4E3Hi96mbQzJWFO8Omw4Gp:lboEj/8ASWM4Ki96/zqIKGp
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a3122701dab9b1b39995f5ee4650f8b8d4d363fd8dac84f3d777ca255fdc1015.exe
Files
-
a3122701dab9b1b39995f5ee4650f8b8d4d363fd8dac84f3d777ca255fdc1015.exe.exe windows:4 windows x86 arch:x86
5e539ac4c687c5ce6caaaf37a79a53af
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SleepEx
FindResourceA
RemoveDirectoryA
GetModuleFileNameA
RemoveDirectoryW
AddAtomA
GetFileAttributesA
CreateDirectoryA
IsBadWritePtr
GetNumberFormatA
GetProcAddress
SetComputerNameW
OpenMutexA
DeleteAtom
GetSystemDefaultLCID
GetModuleHandleA
lstrcpyA
user32
CheckMenuRadioItem
CreateAcceleratorTableA
GetDC
GetMessageW
InvalidateRgn
DialogBoxIndirectParamA
GetClassNameW
SetWindowTextA
IsWindowEnabled
wsprintfA
GetKeyState
DefWindowProcW
UpdateWindow
ActivateKeyboardLayout
DialogBoxParamA
ClientToScreen
CallWindowProcA
AdjustWindowRect
AppendMenuA
UpdateWindow
wvsprintfW
LoadMenuIndirectA
GetClassNameA
UnregisterClassA
SendMessageW
EndDialog
LoadImageW
GetWindowRgn
InvalidateRect
IsMenu
TrackPopupMenu
SendDlgItemMessageA
SetCursorPos
LoadImageA
LoadIconA
CreateWindowExA
SetCursor
BringWindowToTop
LoadBitmapW
RegisterWindowMessageA
DefWindowProcA
DefDlgProcW
GetWindowRect
SetDlgItemTextW
PeekMessageW
GetTopWindow
GetActiveWindow
DrawTextW
MessageBoxIndirectA
SetTimer
gdi32
SetPaletteEntries
PlayMetaFile
CreateFontIndirectExA
GetTextFaceA
GetCharWidth32W
AnimatePalette
GetTextMetricsA
SetArcDirection
RemoveFontResourceExW
CopyEnhMetaFileA
GetTextCharsetInfo
GetDCPenColor
GetBrushOrgEx
Polygon
advapi32
RegQueryInfoKeyA
RegSaveKeyA
RegRestoreKeyW
RegCreateKeyExW
RegDeleteValueA
RegReplaceKeyW
RegOpenKeyA
RegFlushKey
RegOpenKeyW
shlwapi
StrCSpnW
PathCommonPrefixW
PathRemoveExtensionW
StrCmpNIW
PathRemoveFileSpecW
PathIsFileSpecW
PathFindExtensionW
comdlg32
PrintDlgExA
ChooseFontA
GetOpenFileNameA
GetOpenFileNameW
oleaut32
LoadTypeLib
VarR8FromDisp
VarR4FromUI1
setupapi
SetupDefaultQueueCallbackW
ws2_32
gethostname
WSACleanup
urlmon
IsAsyncMoniker
CoGetClassObjectFromURL
crypt32
PFXIsPFXBlob
CertSerializeCTLStoreElement
CryptEnumKeyIdentifierProperties
I_CryptAddRefLruEntry
RegCreateHKCUKeyExU
CryptVerifyDetachedMessageSignature
RegEnumValueU
CryptMsgCountersign
CreateFileU
CertFreeCertificateChainEngine
CertCreateCRLContext
I_CertSyncStore
CryptFormatObject
CertCreateSelfSignCertificate
CertAddEncodedCRLToStore
Sections
.bzhvQQ Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.Fj Size: 512B - Virtual size: 220KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ooKm Size: 4KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.BdD Size: 5KB - Virtual size: 430KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 120KB - Virtual size: 313KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.WGGRl Size: 4KB - Virtual size: 262KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.DAv Size: 2KB - Virtual size: 398KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 764B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ