Static task
static1
Behavioral task
behavioral1
Sample
cb14eb00a38a7dfdb3015458bc828b7648618f3a2a81bddb7fcc19e96afdb7f3.exe
Resource
win7-20230824-en
Behavioral task
behavioral2
Sample
cb14eb00a38a7dfdb3015458bc828b7648618f3a2a81bddb7fcc19e96afdb7f3.exe
Resource
win10v2004-20230703-en
General
-
Target
cb14eb00a38a7dfdb3015458bc828b7648618f3a2a81bddb7fcc19e96afdb7f3
-
Size
1.4MB
-
MD5
472c67b34b00f95b741593ae58d8cee6
-
SHA1
d658aebb0f0a4316c29d35c1a555b7458ef54fd7
-
SHA256
cb14eb00a38a7dfdb3015458bc828b7648618f3a2a81bddb7fcc19e96afdb7f3
-
SHA512
9c8cf2393a9e2668f6901b339476fc9e4e0e3e89d35211ba5bcc5aea83eb63fdd9d845875aeef00ee743f9f346ce8ff01755808a7cb9876c6eac583642b57eb9
-
SSDEEP
24576:lRVgNvS7xsQ/2nNdiRIpXgUVSgzETwQktbBx6K9v0Lzc1Yk+ace95lkqEMeA:8S152nNdiRIpwUVS0ETwptb6M1h95lk
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource cb14eb00a38a7dfdb3015458bc828b7648618f3a2a81bddb7fcc19e96afdb7f3
Files
-
cb14eb00a38a7dfdb3015458bc828b7648618f3a2a81bddb7fcc19e96afdb7f3.exe windows x86
3a285841b494de527b8a771859fa5bca
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
Beep
DeleteCriticalSection
EnterCriticalSection
FillConsoleOutputAttribute
FillConsoleOutputCharacterA
GetConsoleCP
GetConsoleMode
GetConsoleScreenBufferInfo
GetCurrentDirectoryA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetLargestConsoleWindowSize
GetLastError
GetLocaleInfoA
GetModuleFileNameA
GetModuleHandleA
GetShortPathNameA
GetStartupInfoA
GetStdHandle
GetSystemTimeAsFileTime
GetTickCount
InitializeCriticalSection
LeaveCriticalSection
LockFile
MultiByteToWideChar
QueryPerformanceCounter
ScrollConsoleScreenBufferA
SetConsoleCursorPosition
SetConsoleMode
SetConsoleWindowInfo
SetUnhandledExceptionFilter
Sleep
TerminateProcess
TlsGetValue
UnhandledExceptionFilter
UnlockFile
VirtualProtect
VirtualQuery
WideCharToMultiByte
WriteConsoleOutputA
WriteFile
msvcrt
__doserrno
__getmainargs
__initenv
__lconv_init
__p__acmdln
__p__fmode
__pioinfo
__set_app_type
__setusermatherr
_amsg_exit
_cexit
_controlfp
_errno
_execl
_filelengthi64
_fileno
_fmode
_fpreset
_get_osfhandle
_i64toa
_i64tow
_initterm
_iob
_itoa
_lseeki64
_onexit
_pclose
_popen
_putenv
_snprintf
_snwprintf
_spawnl
_strdup
_stricmp
_strnicmp
_ui64toa
_ui64tow
_ultoa
_write
abort
atoi
calloc
exit
fclose
feof
fflush
fgetpos
fgets
fopen
fprintf
fputs
fread
free
freopen
fsetpos
fwrite
getc
getenv
islower
isspace
isupper
localeconv
localtime
log10
malloc
mbstowcs
memcpy
memmove
memset
modf
pow
raise
realloc
remove
rename
setlocale
setvbuf
signal
sprintf
strchr
strcpy
strlen
strncmp
strncpy
strrchr
strtoul
time
system
tolower
toupper
ungetc
vfprintf
wcslen
wcsncmp
wcsstr
wcstombs
Sections
.text Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 263KB - Virtual size: 263KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 701KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 52B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE