Static task
static1
Behavioral task
behavioral1
Sample
25ebe8759e48e79a41e7a566ff7d3e092e413596796c43c73f647b06c1af4129N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
25ebe8759e48e79a41e7a566ff7d3e092e413596796c43c73f647b06c1af4129N.exe
Resource
win10v2004-20241007-en
General
-
Target
25ebe8759e48e79a41e7a566ff7d3e092e413596796c43c73f647b06c1af4129N.exe
-
Size
413KB
-
MD5
1a67e161ff85a9d2b1bd58194cca30b0
-
SHA1
4bd2f526e955f2026290479fb765cd67dedbffe1
-
SHA256
25ebe8759e48e79a41e7a566ff7d3e092e413596796c43c73f647b06c1af4129
-
SHA512
9710b5723204f22db448eefb93f9451329947e1cd388a953f6773c73cccedaadff9bd1c8d88094b34a53884dd1121969116b925dbfc2fd06bc1649897620f75e
-
SSDEEP
12288:v5U6/ysFq7drqq2MLFHqPbckDBjvrEH7E:T2rqZbcSrEH7E
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 25ebe8759e48e79a41e7a566ff7d3e092e413596796c43c73f647b06c1af4129N.exe
Files
-
25ebe8759e48e79a41e7a566ff7d3e092e413596796c43c73f647b06c1af4129N.exe.exe windows:5 windows x86 arch:x86
57d040684e3bd855a1536c9dad1a7964
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
dinput8
DirectInput8Create
dsound
ord11
ddraw
DirectDrawCreateEx
winmm
timeBeginPeriod
timeGetTime
mmioOpenA
mmioDescend
mmioRead
mmioAscend
mmioSeek
mmioGetInfo
mmioAdvance
mmioSetInfo
kernel32
GetModuleHandleA
CloseHandle
PurgeComm
SetCommMask
ClearCommError
GetOverlappedResult
GetLastError
WriteFile
ReadFile
WaitCommEvent
CreateEventA
CreateThread
SetCommTimeouts
SetCommState
GetCommState
CreateFileA
SetFilePointer
MultiByteToWideChar
WideCharToMultiByte
GetTickCount
LeaveCriticalSection
EnterCriticalSection
CreateDirectoryA
InitializeCriticalSection
SetLocalTime
GetLocalTime
SetEvent
WaitForSingleObject
ResetEvent
GetCommMask
GetCommTimeouts
GetCurrentProcess
Sleep
DeleteFileA
GetPrivateProfileStringA
GetDriveTypeA
SetStdHandle
CompareStringA
GetStringTypeW
GetStringTypeA
GetLocaleInfoA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetProcessHeap
SetEndOfFile
LCMapStringW
LCMapStringA
GetTimeZoneInformation
FlushFileBuffers
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
LoadLibraryA
GetFullPathNameA
InterlockedDecrement
InitializeCriticalSectionAndSpinCount
HeapSize
GetCurrentProcessId
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetConsoleMode
GetConsoleCP
CompareStringW
GetCurrentThreadId
HeapFree
HeapAlloc
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
FindFirstFileA
RaiseException
RtlUnwind
SetEnvironmentVariableA
GetCurrentDirectoryA
GetSystemTimeAsFileTime
GetFileInformationByHandle
PeekNamedPipe
GetFileType
GetCommandLineA
GetStartupInfoA
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapCreate
VirtualFree
DeleteCriticalSection
VirtualAlloc
HeapReAlloc
GetModuleHandleW
GetProcAddress
ExitProcess
GetStdHandle
GetModuleFileNameA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
SetHandleCount
user32
DispatchMessageA
PostQuitMessage
ChangeDisplaySettingsA
PostMessageA
SetRect
UpdateWindow
ShowWindow
CreateWindowExA
GetAsyncKeyState
LoadStringA
ShowCursor
PeekMessageA
GetMessageA
TranslateMessage
MessageBoxA
LoadIconA
LoadCursorA
RegisterClassExA
DefWindowProcA
ExitWindowsEx
SystemParametersInfoA
gdi32
CreateFontA
DeleteObject
advapi32
LookupPrivilegeValueA
OpenProcessToken
AdjustTokenPrivileges
ws2_32
htons
Sections
.text Size: 271KB - Virtual size: 270KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ