Static task
static1
Behavioral task
behavioral1
Sample
cd9799e0b5cad223f7e75e89359c33dfec1deaa5e1c570682fe3d89075ab9ef3.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
cd9799e0b5cad223f7e75e89359c33dfec1deaa5e1c570682fe3d89075ab9ef3.exe
Resource
win10v2004-20230220-en
General
-
Target
cd9799e0b5cad223f7e75e89359c33dfec1deaa5e1c570682fe3d89075ab9ef3
-
Size
348KB
-
MD5
0526aa2f94ca844fd97d0ea15fcb33fc
-
SHA1
5739872209d5a3ea4ff05eb4164aa08c340f1610
-
SHA256
cd9799e0b5cad223f7e75e89359c33dfec1deaa5e1c570682fe3d89075ab9ef3
-
SHA512
16b587b3e5497c452832ce684e7b73fcd88911b9c60db982f1844c93064f238b3c6c4070c4b937ba366677ec21ff08f47a2c96c432043a55b17b15322a28d9df
-
SSDEEP
6144:IU9HoCgnTFCXMcBhrA/pZolbuWajrJhFapfnnnFxfRDJu+9sHaPHAPXD:XICgnTYMcLrA/pZsSWYhrKYgHAr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource cd9799e0b5cad223f7e75e89359c33dfec1deaa5e1c570682fe3d89075ab9ef3
Files
-
cd9799e0b5cad223f7e75e89359c33dfec1deaa5e1c570682fe3d89075ab9ef3.exe windows x86
14eeea00f811b54aceb3964ea40923fa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleFileNameW
GetLastError
Sleep
GetTickCount
SystemTimeToTzSpecificLocalTime
FindResourceA
FreeResource
LoadResource
SizeofResource
LockResource
GetShortPathNameW
VirtualFree
GetProcAddress
VirtualAlloc
GetModuleHandleA
VirtualProtect
GetSystemTimeAsFileTime
GetModuleHandleW
ExitProcess
DecodePointer
GetCommandLineA
HeapSetInformation
GetStartupInfoW
EncodePointer
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
HeapFree
FileTimeToSystemTime
RaiseException
GetTimeZoneInformation
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
LoadLibraryW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
WriteFile
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapCreate
QueryPerformanceCounter
GetCurrentProcessId
HeapSize
RtlUnwind
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
SetFilePointer
GetConsoleCP
GetConsoleMode
HeapReAlloc
LCMapStringW
GetStringTypeW
SetStdHandle
WriteConsoleW
CompareStringW
SetEnvironmentVariableA
CreateFileW
CloseHandle
FlushFileBuffers
FindFirstFileW
WideCharToMultiByte
IsProcessorFeaturePresent
MultiByteToWideChar
advapi32
CryptAcquireContextA
CryptGetKeyParam
CryptSetKeyParam
CryptReleaseContext
CryptImportKey
CryptDestroyKey
CryptDecrypt
StartServiceW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
StartServiceCtrlDispatcherW
SetServiceStatus
RegisterServiceCtrlHandlerW
OpenSCManagerW
OpenServiceW
CloseServiceHandle
CreateServiceW
ControlService
DeleteService
QueryServiceStatusEx
ws2_32
WSAStartup
wininet
InternetGetConnectedState
shell32
SHGetPathFromIDListW
SHGetSpecialFolderLocation
Sections
.text Size: 54KB - Virtual size: 54KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 357KB - Virtual size: 356KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ