Static task
static1
Behavioral task
behavioral1
Sample
dc6415110c9c46351d2b47a030238b98408d4c39554fcbf046ec080ba4efbee3.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
dc6415110c9c46351d2b47a030238b98408d4c39554fcbf046ec080ba4efbee3.exe
Resource
win10v2004-20230221-en
General
-
Target
dc6415110c9c46351d2b47a030238b98408d4c39554fcbf046ec080ba4efbee3
-
Size
24KB
-
MD5
8cee7a037c00236729b3007f68df2970
-
SHA1
9f17f3f86e062b8a545cf0f81bd4cdb0a7c8e276
-
SHA256
dc6415110c9c46351d2b47a030238b98408d4c39554fcbf046ec080ba4efbee3
-
SHA512
4b8217189435ebf52182765a1e014d20fff51f4c70750c99e60aa23606db27aa1d29042300ff60fef67b3d1e65588b22f73c2935b90122251abb896ce9f218b9
-
SSDEEP
192:UJHIsOB8xzLKTi0nJ7a9JNfuBkEdNPj2UYKk/qyF2zi+mmv7P7Jr49r61oynBy92:cIDB8uY9JNfxEdJhR149r61XLxp/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource dc6415110c9c46351d2b47a030238b98408d4c39554fcbf046ec080ba4efbee3
Files
-
dc6415110c9c46351d2b47a030238b98408d4c39554fcbf046ec080ba4efbee3.exe windows x86
878269cbba6ce49af713b67e3015e31a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleFileNameA
LoadLibraryA
FreeLibrary
OutputDebugStringA
Sleep
GetProcAddress
WaitForSingleObject
OpenProcess
CreateThread
GetModuleHandleA
GetStartupInfoA
user32
TranslateAcceleratorA
GetMessageA
LoadAcceleratorsA
LoadStringA
RegisterClassExA
LoadCursorA
LoadIconA
DispatchMessageA
CreateWindowExA
DefWindowProcA
DestroyWindow
PostQuitMessage
EndPaint
BeginPaint
PostMessageA
TranslateMessage
msvcp60
?_Xran@std@@YAXXZ
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
??_7out_of_range@std@@6B@
??1out_of_range@std@@UAE@XZ
??0out_of_range@std@@QAE@ABV01@@Z
??0logic_error@std@@QAE@ABV01@@Z
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@PBDABV10@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBDABV?$allocator@D@1@@Z
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@PBD@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?substr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV12@II@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
msvcrt
??1exception@@UAE@XZ
__dllonexit
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
__CxxFrameHandler
strrchr
sprintf
atoi
_access
strncpy
??2@YAPAXI@Z
??0exception@@QAE@ABV0@@Z
_exit
??0exception@@QAE@ABQBD@Z
_CxxThrowException
memmove
free
??1type_info@@UAE@XZ
_onexit
Sections
.text Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 940B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ