Static task
static1
Behavioral task
behavioral1
Sample
c96d73c3a134a9245fe18faadfaac4d0a6336be812012c1c228404786ed3d749.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
c96d73c3a134a9245fe18faadfaac4d0a6336be812012c1c228404786ed3d749.exe
Resource
win10v2004-20231020-en
General
-
Target
c96d73c3a134a9245fe18faadfaac4d0a6336be812012c1c228404786ed3d749
-
Size
231KB
-
MD5
3d7832ba26c356fac35412a1dc495ff2
-
SHA1
a4b324f82842e07f353056f9f1a1ecbb9e4a0a22
-
SHA256
c96d73c3a134a9245fe18faadfaac4d0a6336be812012c1c228404786ed3d749
-
SHA512
0b8088434d4f72be8cf8e5960b00bdfb403afa8eee90c3595564518a2cbf5fd6bed9e55efa981f5f11f9ae1ddd26e982d4838b1a0982b6cdc82d681021583993
-
SSDEEP
3072:qXSHqk/TAw0O1zGJlLuX5dZCWCaumX1jYKGL7N8NjWH+G4yVz4rj44PZ0BFDQfZX:q23ARLuX5dZxZNWyoWjlPZ07k5vB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c96d73c3a134a9245fe18faadfaac4d0a6336be812012c1c228404786ed3d749
Files
-
c96d73c3a134a9245fe18faadfaac4d0a6336be812012c1c228404786ed3d749.exe windows:6 windows x86
a327be3d3ac776854cb6afb648005a3b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
PathRemoveBackslashW
PathRemoveFileSpecW
wintrust
WinVerifyTrust
WTHelperProvDataFromStateData
WTHelperGetProvCertFromChain
WTHelperGetProvSignerFromChain
crypt32
CertGetNameStringW
kernel32
FreeEnvironmentStringsW
GetEnvironmentStringsW
FindFirstFileExW
GetCommandLineA
HeapFree
CreateFileW
GetLastError
CloseHandle
HeapAlloc
GetProcAddress
GetProcessHeap
CreateDirectoryW
FindFirstFileW
SetLastError
GetCommandLineW
FindNextFileW
GetCurrentProcess
RemoveDirectoryW
GetTempPathW
FindClose
GetFileAttributesW
DeleteFileW
MoveFileExW
CopyFileW
GetTempFileNameW
MoveFileW
LoadLibraryW
GetWindowsDirectoryW
GetModuleHandleW
LoadLibraryExW
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
GetCurrentThreadId
EnterCriticalSection
DeleteCriticalSection
GetStdHandle
GetFileType
GetStartupInfoW
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsFree
GetSystemTimeAsFileTime
FreeLibrary
LCMapStringW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetStringTypeW
MultiByteToWideChar
WideCharToMultiByte
SetFilePointerEx
SetStdHandle
ExitProcess
GetModuleHandleExW
WriteFile
GetConsoleCP
GetConsoleMode
FlushFileBuffers
GetModuleFileNameW
DecodePointer
RaiseException
WriteConsoleW
HeapSize
HeapReAlloc
RtlUnwind
QueryPerformanceCounter
GetCurrentProcessId
InitializeSListHead
LeaveCriticalSection
TlsSetValue
advapi32
RegQueryValueExW
RegOpenKeyExW
GetTokenInformation
OpenProcessToken
RegCloseKey
shell32
CommandLineToArgvW
ShellExecuteW
SHGetSpecialFolderPathW
Sections
.text Size: 52KB - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
PACK Size: 144KB - Virtual size: 380KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE