Static task
static1
Behavioral task
behavioral1
Sample
a316c6f87cf5a6d5ee485c12aa39168a586686d9da496d29816351e3c625689d.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
a316c6f87cf5a6d5ee485c12aa39168a586686d9da496d29816351e3c625689d.exe
Resource
win10v2004-20230915-en
General
-
Target
a316c6f87cf5a6d5ee485c12aa39168a586686d9da496d29816351e3c625689d
-
Size
114KB
-
MD5
d88e62899ce05f8976b56efa06e0adc5
-
SHA1
98c9cf23fbb7ae0ffb4ad4e791d6956ccb2c3ca9
-
SHA256
a316c6f87cf5a6d5ee485c12aa39168a586686d9da496d29816351e3c625689d
-
SHA512
824de715bac6b1a42ffca8c63b9412be2475644362b86fccdbf707e27dacb9b76e2b500aae25ef6370a17528d25898cd78951aea9ac85e54c8ce41ce157d5625
-
SSDEEP
1536:Scqi99P99GV2wC0dO0I/Kj23iBs1HjGNOTKi8gEFgzRrw0M0AQSrxOb:iitv0nIm2es1HUjzFgzKB0arxW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a316c6f87cf5a6d5ee485c12aa39168a586686d9da496d29816351e3c625689d
Files
-
a316c6f87cf5a6d5ee485c12aa39168a586686d9da496d29816351e3c625689d.exe windows:6 windows x86
7f1d057e3f2ccdc0f08a3f4e9dc6ec02
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
AreFileApisANSI
GetFileType
GetFileInformationByHandle
GetDriveTypeW
CreateFileW
FreeLibrary
InitializeSListHead
GetTickCount64
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetStartupInfoW
IsDebuggerPresent
IsProcessorFeaturePresent
CloseHandle
GetCurrentProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
DecodePointer
EncodePointer
LocalFree
DeleteCriticalSection
InitializeCriticalSectionEx
LeaveCriticalSection
EnterCriticalSection
InitOnceExecuteOnce
GetLastError
GetModuleHandleW
GetProcAddress
WideCharToMultiByte
GetCurrentProcessId
SetCurrentDirectoryW
MultiByteToWideChar
Sleep
GetCurrentThreadId
GetModuleFileNameW
TerminateProcess
GetShortPathNameW
PeekNamedPipe
user32
UpdateWindow
BeginPaint
GetParent
LoadCursorW
TranslateMessage
TranslateAcceleratorW
EnumWindows
EndPaint
DispatchMessageW
ShowWindow
LoadStringW
LoadAcceleratorsW
RegisterClassExW
SendMessageW
CreateWindowExW
MessageBoxW
DestroyWindow
DefWindowProcW
GetMessageW
LoadImageW
GetClientRect
SetWindowLongW
UnregisterClassW
GetSystemMetrics
SetWindowPos
GetWindowLongW
GetWindowTextW
gdi32
SelectObject
CreateCompatibleDC
GetStockObject
DeleteDC
GetObjectW
DeleteObject
BitBlt
advapi32
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
shell32
ShellExecuteW
SHGetPathFromIDListW
SHGetSpecialFolderLocation
oleaut32
SysAllocString
SysFreeString
VariantClear
ws2_32
socket
send
WSAStartup
gethostbyname
closesocket
connect
htons
recv
shlwapi
PathRemoveFileSpecW
msvcrt
__pctype_func
tolower
_cexit
__setusermatherr
_initterm
_initterm_e
_exit
_set_fmode
_c_exit
__p__commode
_amsg_exit
_except_handler4_common
__wgetmainargs
atexit
_controlfp_s
__DestructExceptionObject
_lock
_unlock
__doserrno
___lc_codepage_func
__dllonexit
__set_app_type
_wcmdln
??3@YAXPAX@Z
?terminate@@YAXXZ
_XcptFilter
__uncaught_exception
memmove
memcpy
_CxxThrowException
malloc
_time64
??_U@YAPAXI@Z
_wgetcwd
wcstombs
rand
_beginthread
srand
setlocale
exit
frexp
free
localeconv
??0exception@@QAE@ABV0@@Z
??0exception@@QAE@ABQBD@Z
??1exception@@UAE@XZ
?what@exception@@UBEPBDXZ
strcspn
??2@YAPAXI@Z
calloc
??_V@YAXPAX@Z
__CxxFrameHandler3
abort
_errno
_getdrive
_wfullpath
wcsrchr
wcspbrk
_wcsicmp
strtol
wctomb_s
wcsnlen
strnlen
strrchr
strcpy_s
_CIlog10
_ftol2_sse
ceil
_clearfp
memset
___lc_handle_func
___mb_cur_max_func
msvcp60
_Tolower
_Toupper
_Getctype
Sections
.text Size: 63KB - Virtual size: 63KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 23KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ