Static task
static1
Behavioral task
behavioral1
Sample
2186e0e9fe65fed9eb994fbd48f5069d106dd36ce5fae001cb8c2925c313077c.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
2186e0e9fe65fed9eb994fbd48f5069d106dd36ce5fae001cb8c2925c313077c.exe
Resource
win10v2004-20231020-en
General
-
Target
2186e0e9fe65fed9eb994fbd48f5069d106dd36ce5fae001cb8c2925c313077c
-
Size
250KB
-
MD5
b5cc2607dd0ee069efcb55c1ccc1bb73
-
SHA1
08ece9154cf8fc502035b040fb9a1915f4b80be6
-
SHA256
2186e0e9fe65fed9eb994fbd48f5069d106dd36ce5fae001cb8c2925c313077c
-
SHA512
1e352fcd823adf6111af06fac7e6d44bd970970fdff3cf745d6da4c3bcdbf5fe0b5221e98b482729f4d4992ecbd580a852e6dc58ee35c44af4c008a1a1f8fa86
-
SSDEEP
6144:xo71eScDAXgcUgfAmJfWTGs4/aJp835DNXjded/bFX1/W+:+e10XgOAmJRKbFX1e+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2186e0e9fe65fed9eb994fbd48f5069d106dd36ce5fae001cb8c2925c313077c
Files
-
2186e0e9fe65fed9eb994fbd48f5069d106dd36ce5fae001cb8c2925c313077c.exe windows:4 windows x86 arch:x86
98cdac6a7e6cc4bb576440dabd1a1060
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
CloseServiceHandle
ControlService
DeleteService
OpenSCManagerA
OpenServiceA
QueryServiceStatus
RegCloseKey
RegDeleteKeyA
RegDeleteValueA
RegOpenKeyExA
comctl32
PropertySheetA
kernel32
CloseHandle
CreateSemaphoreW
DeleteCriticalSection
DeleteFileA
EnterCriticalSection
ExitProcess
FindClose
FindFirstFileA
FindNextFileA
FindResourceExA
FreeLibrary
GetCommandLineA
GetCurrentThreadId
GetLastError
GetModuleHandleA
GetProcAddress
GetStartupInfoA
InitializeCriticalSection
InterlockedDecrement
InterlockedExchange
InterlockedIncrement
IsDBCSLeadByteEx
LeaveCriticalSection
LoadLibraryA
LoadResource
LockResource
MultiByteToWideChar
OutputDebugStringA
ReleaseSemaphore
RemoveDirectoryA
SetLastError
SetUnhandledExceptionFilter
Sleep
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
VirtualProtect
VirtualQuery
WaitForSingleObject
WideCharToMultiByte
msvcrt
_strdup
_stricmp
_stricoll
_write
__getmainargs
__mb_cur_max
__p__environ
__p__fmode
__set_app_type
_cexit
_errno
_fullpath
_iob
_isctype
_onexit
_pctype
_setmode
abort
atexit
atoi
calloc
fclose
fopen
fputc
fputs
fread
free
fseek
fwrite
getenv
localeconv
malloc
mbstowcs
memcmp
memcpy
memset
realloc
setlocale
signal
sprintf
strchr
strcmp
strcoll
strcpy
strlen
tolower
vfprintf
vsprintf
wcslen
wcstombs
user32
GetDlgItem
GetMessagePos
GetParent
GetWindowLongA
PostMessageA
ScreenToClient
SendMessageA
SetWindowLongA
Sections
.text Size: 112KB - Virtual size: 112KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 136B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.eh_fram Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 2KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 101KB - Virtual size: 101KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE