Static task
static1
Behavioral task
behavioral1
Sample
d1ff9e16abf3f1ed36f9860bb843cb64222c3230dbbbc8e7882133225723835fN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d1ff9e16abf3f1ed36f9860bb843cb64222c3230dbbbc8e7882133225723835fN.exe
Resource
win10v2004-20241007-en
General
-
Target
d1ff9e16abf3f1ed36f9860bb843cb64222c3230dbbbc8e7882133225723835fN.exe
-
Size
1.5MB
-
MD5
20be196e562a42c26883250666c0b860
-
SHA1
3df340b8cba4a6ee948094dc3280d6f70beadb6a
-
SHA256
d1ff9e16abf3f1ed36f9860bb843cb64222c3230dbbbc8e7882133225723835f
-
SHA512
deab3d3ca7dbc15d93d29d3e5cefd83dfd13b6ccc61bfa8d0b2769be4352fcbc0d2cc2512c882b722aeaaa115ae81f1efd437bb7817ce71e2e08744aa315b429
-
SSDEEP
49152:iF76ZMINgnSqCbmb3z9c5yrbd5PQOrmSU:ilFISnpCbQ5yy7QWmSU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d1ff9e16abf3f1ed36f9860bb843cb64222c3230dbbbc8e7882133225723835fN.exe
Files
-
d1ff9e16abf3f1ed36f9860bb843cb64222c3230dbbbc8e7882133225723835fN.exe.exe windows:5 windows x86 arch:x86
b69c2bc82a9f0590c69411a07af9f395
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLastError
CloseHandle
CreateFileA
GetFileSize
MapViewOfFile
UnmapViewOfFile
GetTickCount
WriteFile
SetLastError
GetProcAddress
CreateFileMappingA
GetModuleFileNameA
GetModuleHandleA
DeleteFileA
HeapReAlloc
MoveFileExA
CreateProcessW
HeapAlloc
SystemTimeToFileTime
GetCurrentProcess
HeapFree
GetProcessHeap
GetExitCodeProcess
TerminateProcess
GetTempFileNameA
GetLocalTime
LoadLibraryA
DuplicateHandle
GetTempPathA
GetFullPathNameA
GetThreadContext
GetCurrentThread
IsBadReadPtr
ExpandEnvironmentStringsA
WideCharToMultiByte
GetFileAttributesA
GetEnvironmentVariableA
MultiByteToWideChar
CreateDirectoryA
FindFirstFileA
RemoveDirectoryA
FindClose
GetCurrentDirectoryA
GetCurrentProcessId
GetVolumeInformationW
WaitForSingleObject
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
OpenProcess
CreateFileW
GetCurrentThreadId
EncodePointer
DecodePointer
GetCommandLineA
HeapSetInformation
GetStartupInfoW
HeapCreate
GetModuleHandleW
ExitProcess
GetStdHandle
GetModuleFileNameW
IsProcessorFeaturePresent
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
InterlockedDecrement
Sleep
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapSize
RaiseException
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringW
InitializeCriticalSectionAndSpinCount
RtlUnwind
SetHandleCount
GetFileType
SetFilePointer
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetSystemTimeAsFileTime
LoadLibraryW
GetStringTypeW
GetConsoleCP
GetConsoleMode
SetStdHandle
FlushFileBuffers
WriteConsoleW
VirtualQuery
advapi32
CheckTokenMembership
RegCloseKey
FreeSid
AllocateAndInitializeSid
RegOpenKeyExA
RegQueryValueExA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
shell32
ShellExecuteExW
Sections
.text Size: 96KB - Virtual size: 95KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ