Static task
static1
Behavioral task
behavioral1
Sample
906ff0eda5fe4020827b57f3972b4854ed345417f9d6093d6a565d38122464ed.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
906ff0eda5fe4020827b57f3972b4854ed345417f9d6093d6a565d38122464ed.exe
Resource
win10v2004-20230220-en
General
-
Target
906ff0eda5fe4020827b57f3972b4854ed345417f9d6093d6a565d38122464ed
-
Size
24KB
-
MD5
4790e357dd1ca9114cb1a70249ab082d
-
SHA1
2576bf2909f16e0e8770729a30adccd45d0f2502
-
SHA256
906ff0eda5fe4020827b57f3972b4854ed345417f9d6093d6a565d38122464ed
-
SHA512
3446e3dbcd205b17b5394ccbf26b5421533792e551d2250fac8b3b606cf8ef2cd45b6dce853f156a29c5ec50bbc5a1abe45ea9e7803c501618e726790135987c
-
SSDEEP
192:QJHIsOB8xzLKTi0nJ7a9JNfuBkEdNPjGUYKk/qyF2zi+mmv7P7Jr49r61oynBy9m:QIDB8uY9JNfxEdJxR149r61XLxpr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 906ff0eda5fe4020827b57f3972b4854ed345417f9d6093d6a565d38122464ed
Files
-
906ff0eda5fe4020827b57f3972b4854ed345417f9d6093d6a565d38122464ed.exe windows x86
878269cbba6ce49af713b67e3015e31a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleFileNameA
LoadLibraryA
FreeLibrary
OutputDebugStringA
Sleep
GetProcAddress
WaitForSingleObject
OpenProcess
CreateThread
GetModuleHandleA
GetStartupInfoA
user32
TranslateAcceleratorA
GetMessageA
LoadAcceleratorsA
LoadStringA
RegisterClassExA
LoadCursorA
LoadIconA
DispatchMessageA
CreateWindowExA
DefWindowProcA
DestroyWindow
PostQuitMessage
EndPaint
BeginPaint
PostMessageA
TranslateMessage
msvcp60
?_Xran@std@@YAXXZ
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
??_7out_of_range@std@@6B@
??1out_of_range@std@@UAE@XZ
??0out_of_range@std@@QAE@ABV01@@Z
??0logic_error@std@@QAE@ABV01@@Z
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@PBDABV10@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBDABV?$allocator@D@1@@Z
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@PBD@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?substr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV12@II@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
msvcrt
??1exception@@UAE@XZ
__dllonexit
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
__CxxFrameHandler
strrchr
sprintf
atoi
_access
strncpy
??2@YAPAXI@Z
??0exception@@QAE@ABV0@@Z
_exit
??0exception@@QAE@ABQBD@Z
_CxxThrowException
memmove
free
??1type_info@@UAE@XZ
_onexit
Sections
.text Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 940B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ