export_v1
Static task
static1
Behavioral task
behavioral1
Sample
ca00cb48f76e6fa89fe7c47900045b4911d933d61a91b825173512bdbd5dcf24.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
ca00cb48f76e6fa89fe7c47900045b4911d933d61a91b825173512bdbd5dcf24.exe
Resource
win10v2004-20231023-en
General
-
Target
ca00cb48f76e6fa89fe7c47900045b4911d933d61a91b825173512bdbd5dcf24
-
Size
74KB
-
MD5
4072908a1be4dde1f42f27e70685aabf
-
SHA1
69e8ed8be13573fa6d0fa8892059f16d0b1e9050
-
SHA256
ca00cb48f76e6fa89fe7c47900045b4911d933d61a91b825173512bdbd5dcf24
-
SHA512
04c06270e100a1c501a87dc5439a8e662ce9e14c1ea98adbd49f4ea9a9e140dca2a02f61562b6c77d54813705421e53d42dc1766b8dd7e4118b22748eb49b736
-
SSDEEP
768:KYgyPf190N/OSNkHYpIEZomYaOPdcU0fUafEDK0X/beocZ8R6pwmpLzif0zVXjCi:KWPNWVNUY/Ya1mG0XqN8IxpLnpmnW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ca00cb48f76e6fa89fe7c47900045b4911d933d61a91b825173512bdbd5dcf24
Files
-
ca00cb48f76e6fa89fe7c47900045b4911d933d61a91b825173512bdbd5dcf24.exe windows:5 windows x64
53083c23b66e8b89dc75ae2278165fd0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
msvcrt
strtok
strncpy
_time64
rand
malloc
__pctype_func
tolower
_errno
strtol
_initterm
___lc_handle_func
___lc_codepage_func
?terminate@@YAXXZ
ceil
log10
_clearfp
strrchr
__C_specific_handler
memcpy
memset
memmove
__CxxFrameHandler
abort
_callnewh
_itoa
_CxxThrowException
free
strcmp
crypt32
CryptBinaryToStringA
CryptImportPublicKeyInfo
CryptStringToBinaryA
CryptDecodeObjectEx
kernel32
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
WideCharToMultiByte
RtlLookupFunctionEntry
RtlCaptureContext
GetModuleHandleExW
RtlVirtualUnwind
GetModuleFileNameA
GetOEMCP
GetCurrentProcess
GetModuleHandleA
GetACP
GetVersionExA
GetProcAddress
GetCurrentProcessId
GetComputerNameA
FreeLibrary
Sleep
GetLastError
WaitForSingleObject
MultiByteToWideChar
TerminateProcess
CreateThread
GetModuleHandleW
VirtualProtect
ExitThread
ExitProcess
LocalFree
GetCurrentThreadId
advapi32
FreeSid
GetUserNameA
AllocateAndInitializeSid
CryptDestroyKey
CryptAcquireContextA
CryptEncrypt
CryptGenRandom
CryptDecrypt
CryptCreateHash
CryptHashData
CryptSetHashParam
CryptDestroyHash
CryptSetKeyParam
CryptImportKey
CryptGetHashParam
CryptReleaseContext
CheckTokenMembership
wininet
InternetQueryDataAvailable
InternetQueryOptionA
HttpOpenRequestA
InternetSetOptionA
InternetOpenA
InternetCloseHandle
HttpSendRequestA
InternetConnectA
InternetReadFile
HttpQueryInfoA
ws2_32
htons
ntohs
WSACleanup
WSAIoctl
closesocket
WSAStartup
WSASocketA
htonl
ntohl
Exports
Exports
Sections
.text Size: 46KB - Virtual size: 45KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 23.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gfids Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 2B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 268B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ