Static task
static1
Behavioral task
behavioral1
Sample
c1324702d74746b58655a3a10970f2db200f6cc36e878011574206d2c2f6d831.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
c1324702d74746b58655a3a10970f2db200f6cc36e878011574206d2c2f6d831.exe
Resource
win10v2004-20230703-en
General
-
Target
c1324702d74746b58655a3a10970f2db200f6cc36e878011574206d2c2f6d831
-
Size
31KB
-
MD5
44d0999a5efcb5222de6f25cb06c7d10
-
SHA1
c6d4ffbc1b6d2904430862a78e4d8dc23a9fee22
-
SHA256
c1324702d74746b58655a3a10970f2db200f6cc36e878011574206d2c2f6d831
-
SHA512
e7bb21052da1197e6fe65f685007b2832c2a66d4ba8edd176afa1d2a15f8597428500693b3a7e8542ddab0d4d7882821ac97d9e93737be57e808f3318eaa0f3e
-
SSDEEP
384:x6jdgaNc4rkl0F4JmnXo5yt4JMPripLiP2H46EAOpKvi1TgCVKTvSwStM/PDZ0/F:xWzpXo5ADipLi643AkFxjVYp/PDZfK5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c1324702d74746b58655a3a10970f2db200f6cc36e878011574206d2c2f6d831
Files
-
c1324702d74746b58655a3a10970f2db200f6cc36e878011574206d2c2f6d831.exe windows x86
ef233b667338ec457703c502f5894c92
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileW
GetTimeZoneInformation
SystemTimeToTzSpecificLocalTime
GetSystemDirectoryW
LoadLibraryExW
GetDriveTypeW
GetVolumePathNameW
GetFileType
GetCommandLineW
CreateProcessW
CloseHandle
LoadLibraryW
FreeLibrary
GetProcAddress
InterlockedCompareExchange
InterlockedExchange
Sleep
GetStartupInfoW
SetUnhandledExceptionFilter
GetModuleHandleA
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
CreateMutexW
WaitForSingleObject
ReleaseMutex
CompareStringW
SetEndOfFile
SetFilePointer
UnmapViewOfFile
MapViewOfFile
CreateFileMappingW
GetFileSize
SetLastError
GetLastError
GetSystemTime
InterlockedDecrement
InterlockedIncrement
GetModuleFileNameW
GetModuleHandleW
FlushFileBuffers
WriteFile
WideCharToMultiByte
OutputDebugStringW
VerifyVersionInfoW
VerSetConditionMask
lstrlenW
HeapAlloc
GetProcessHeap
HeapFree
ExpandEnvironmentStringsW
GetFileAttributesW
CreateDirectoryW
msvcrt
_vsnwprintf
free
malloc
memcpy
memmove
memset
__wgetmainargs
_cexit
_exit
_XcptFilter
exit
_wcmdln
_initterm
_amsg_exit
__setusermatherr
__p__commode
__p__fmode
__set_app_type
?terminate@@YAXXZ
_except_handler4_common
_controlfp
_unlock
__dllonexit
_lock
_onexit
advapi32
SetSecurityDescriptorDacl
AllocateAndInitializeSid
FreeSid
GetTokenInformation
DuplicateTokenEx
CheckTokenMembership
IsValidSid
CopySid
RegQueryValueExW
GetUserNameW
GetLengthSid
InitializeAcl
AddAccessAllowedAce
RegCloseKey
RegOpenKeyExW
InitializeSecurityDescriptor
ole32
CoInitializeEx
CoCreateInstance
CoUninitialize
shlwapi
StrChrW
StrRChrW
PathIsRelativeW
PathIsRootW
PathIsUNCW
PathStripToRootW
Sections
.text Size: 27KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE