Static task
static1
Behavioral task
behavioral1
Sample
d71924a1d29b52490052e207c9d5395e6269db9ddad212efaccb1a61653669b7.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral2
Sample
d71924a1d29b52490052e207c9d5395e6269db9ddad212efaccb1a61653669b7.exe
Resource
win11-20240611-en
General
-
Target
d71924a1d29b52490052e207c9d5395e6269db9ddad212efaccb1a61653669b7
-
Size
210KB
-
MD5
d4b19b167f46a1954e0b2a196cdd7752
-
SHA1
9069f06907762ca4fc8e123b9bcea5baac8e6c8e
-
SHA256
d71924a1d29b52490052e207c9d5395e6269db9ddad212efaccb1a61653669b7
-
SHA512
7c68242e196ae249f250ee90ec928b85eb9dd890e48396564857622bee13afae744578dc0066a842d8d0acc6e9f57c6b52a1a68ee9792c55b048eeaabc8ba7f7
-
SSDEEP
3072:C0QxDEvubro3KCwlIB1zewJxHpR5YfFX/7kAnE9m:6EvqyDwlIiwJx5Yftc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource d71924a1d29b52490052e207c9d5395e6269db9ddad212efaccb1a61653669b7
Files
-
d71924a1d29b52490052e207c9d5395e6269db9ddad212efaccb1a61653669b7.exe windows:5 windows x86 arch:x86
36e010ed97e228773a11cf6ab4a0f83f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindResourceA
IsBadStringPtrW
GetConsoleAliasesLengthW
CommConfigDialogA
SetEndOfFile
FindResourceW
LoadLibraryExW
InterlockedIncrement
CreateDirectoryW
GlobalLock
GetWindowsDirectoryA
GlobalFindAtomA
LoadLibraryW
AssignProcessToJobObject
ReplaceFileA
SetLastError
GetProcAddress
RemoveVectoredExceptionHandler
LocalAlloc
GetDiskFreeSpaceA
GlobalGetAtomNameW
OpenJobObjectW
EnumResourceTypesW
GetOEMCP
OpenFileMappingA
SetFileAttributesW
CreateFileW
SetStdHandle
WriteConsoleW
CloseHandle
SetFilePointer
GetDateFormatW
LoadLibraryA
GetSystemDefaultLangID
MultiByteToWideChar
DecodePointer
EncodePointer
GetLastError
HeapReAlloc
GetModuleHandleW
ExitProcess
GetCommandLineA
HeapSetInformation
GetStartupInfoW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
GetCPInfo
InterlockedDecrement
GetACP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThreadId
EnterCriticalSection
LeaveCriticalSection
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
HeapCreate
HeapFree
HeapAlloc
WriteFile
GetModuleFileNameW
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
Sleep
LCMapStringW
GetStringTypeW
RtlUnwind
HeapSize
IsProcessorFeaturePresent
GetConsoleCP
GetConsoleMode
FlushFileBuffers
user32
OpenIcon
CharUpperBuffW
GetClassInfoW
GetKeyboardLayoutNameW
DdeCmpStringHandles
GetCaretPos
SetMessageExtraInfo
advapi32
AreAllAccessesGranted
ClearEventLogW
Sections
.text Size: 117KB - Virtual size: 117KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 44KB - Virtual size: 39.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 37KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ