Static task
static1
Behavioral task
behavioral1
Sample
2424976b35ec979bfdf69f3df757fcd680d7603b2e5c8d0926effa404847aa58.exe
Resource
win7-20241010-en
General
-
Target
2424976b35ec979bfdf69f3df757fcd680d7603b2e5c8d0926effa404847aa58.exe
-
Size
480KB
-
MD5
4c84e5a5cc694abb62a1b890754f5067
-
SHA1
e8ae41731f3918346a37c2511b912bb7c1bf663f
-
SHA256
2424976b35ec979bfdf69f3df757fcd680d7603b2e5c8d0926effa404847aa58
-
SHA512
3919e61eadf5f33512234b44e867adb2bd43820f58bffd34e15df90d7dfe9318605c754d698256d5b35050fa3b718b2b3db249c0e7f17b27a7f331cf7e2d8508
-
SSDEEP
12288:1u6FtLYwnH+Ze6KKmCPOxvoE69HVjTy5ewsVCFb57Aeiy:1uutDH+ZgK5POxvR4jTy5wop57Ae9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2424976b35ec979bfdf69f3df757fcd680d7603b2e5c8d0926effa404847aa58.exe
Files
-
2424976b35ec979bfdf69f3df757fcd680d7603b2e5c8d0926effa404847aa58.exe.exe windows:4 windows x86 arch:x86
1f951668c5044ba9266633fb0c803aa4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
CharPrevA
CharPrevExA
CharUpperA
CharUpperW
CharNextA
oleaut32
VariantCopy
SysFreeString
VariantClear
SysAllocString
kernel32
WriteFile
SetEndOfFile
GetStringTypeW
GetStringTypeA
SetConsoleCtrlHandler
FileTimeToLocalFileTime
GetCommandLineW
SetFileApisToOEM
GetVersionExA
VirtualAlloc
VirtualFree
GetProcAddress
GetModuleHandleA
MultiByteToWideChar
WideCharToMultiByte
GetLastError
FreeLibrary
LoadLibraryA
AreFileApisANSI
GetModuleFileNameA
LocalFree
FormatMessageA
FormatMessageW
GetWindowsDirectoryA
GetWindowsDirectoryW
SetFileAttributesA
SetFileAttributesW
RemoveDirectoryA
RemoveDirectoryW
MoveFileA
MoveFileW
CreateDirectoryA
CreateDirectoryW
DeleteFileA
DeleteFileW
lstrlenA
GetFullPathNameA
GetFullPathNameW
GetCurrentDirectoryA
SetCurrentDirectoryA
SetCurrentDirectoryW
GetCurrentDirectoryW
SearchPathA
SearchPathW
GetTempPathA
GetTempPathW
GetTempFileNameA
GetTempFileNameW
FindClose
FindFirstFileA
FindFirstFileW
FindNextFileA
FindNextFileW
CreateFileA
CreateFileW
CloseHandle
GetFileSize
SetFilePointer
ReadFile
SetFileTime
ExitProcess
GetCurrentProcess
CompareFileTime
FileTimeToSystemTime
CreateEventA
GetStdHandle
LeaveCriticalSection
EnterCriticalSection
ResetEvent
SetEvent
WaitForSingleObject
WaitForMultipleObjects
OpenEventA
UnmapViewOfFile
MapViewOfFile
OpenFileMappingA
SystemTimeToFileTime
GetSystemTime
FileTimeToDosDateTime
CreateThread
DeleteCriticalSection
InitializeCriticalSection
LocalFileTimeToFileTime
DosDateTimeToFileTime
GetTickCount
RaiseException
RtlUnwind
HeapAlloc
HeapFree
GetCommandLineA
GetVersion
LCMapStringA
LCMapStringW
SetUnhandledExceptionFilter
GetCurrentThreadId
TlsSetValue
TlsAlloc
SetLastError
TlsGetValue
GetEnvironmentVariableA
HeapDestroy
HeapCreate
HeapReAlloc
IsBadWritePtr
SetHandleCount
GetFileType
GetStartupInfoA
TerminateProcess
HeapSize
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
IsBadReadPtr
IsBadCodePtr
FlushFileBuffers
SetStdHandle
InterlockedDecrement
InterlockedIncrement
GetCPInfo
GetACP
GetOEMCP
Sections
.text Size: 403KB - Virtual size: 403KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 48KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 22KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 736B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.zero Size: 4KB - Virtual size: 3KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ