Static task
static1
Behavioral task
behavioral1
Sample
279a42e45255f362c5dbaa0c8ce3c9444f653511ac3df6a763170166a79e96d5.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
279a42e45255f362c5dbaa0c8ce3c9444f653511ac3df6a763170166a79e96d5.exe
Resource
win10v2004-20231215-en
General
-
Target
279a42e45255f362c5dbaa0c8ce3c9444f653511ac3df6a763170166a79e96d5
-
Size
3.1MB
-
MD5
29f6963477ed509e57694bbdcf3a926d
-
SHA1
62cd391bbfe0a1de1c69a1198835a9790058c2fc
-
SHA256
279a42e45255f362c5dbaa0c8ce3c9444f653511ac3df6a763170166a79e96d5
-
SHA512
c5cdc2267f14dd562c4f6a68fe6117e3b274e854b03231f3bd5d76db808fa62768b1a37d61fc51fc20d7e75fa04581ed91bd3d0865c23bf7d71b8e2a98ffd641
-
SSDEEP
49152:5IkGI+sjeG0BjS1cV5QZuTtS0rQMYOQ+q8CEwjSn6rivjStI9KFeMA:5H1jeraaWsM0r1Qn5OqI0Fe5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 279a42e45255f362c5dbaa0c8ce3c9444f653511ac3df6a763170166a79e96d5
Files
-
279a42e45255f362c5dbaa0c8ce3c9444f653511ac3df6a763170166a79e96d5.exe windows:4 windows x86 arch:x86
58dbeae88109fc17527fc4023fdb428b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLocalTime
CreateMutexA
LocalFree
CreateFileA
OpenProcess
Sleep
OpenMutexA
CreateFileMappingA
SetUnhandledExceptionFilter
CloseHandle
GetWindowsDirectoryA
SetEvent
EnterCriticalSection
GetCurrentProcess
GetPrivateProfileStringA
QueryDosDeviceA
Process32NextW
GetLogicalDriveStringsA
Process32FirstW
CreateToolhelp32Snapshot
DuplicateHandle
SetFileAttributesA
OpenFileMappingA
GetFileSize
GetProcessTimes
DeleteFileA
MultiByteToWideChar
WideCharToMultiByte
GetCurrentDirectoryW
SetFilePointer
SystemTimeToFileTime
LocalFileTimeToFileTime
GetTickCount
CreateEventA
WaitForSingleObject
GetCurrentProcessId
InitializeCriticalSection
GetFileAttributesA
LeaveCriticalSection
OutputDebugStringA
UnmapViewOfFile
MapViewOfFile
GetLastError
OpenEventA
GetModuleFileNameA
WriteFile
WaitNamedPipeA
CreateDirectoryA
SetEndOfFile
GetLocaleInfoW
SetStdHandle
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
LoadLibraryA
GetStringTypeW
ReadFile
GetStringTypeA
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
InterlockedIncrement
InterlockedDecrement
InterlockedExchange
DeleteCriticalSection
ExitThread
GetCurrentThreadId
CreateThread
TerminateProcess
UnhandledExceptionFilter
IsDebuggerPresent
GetSystemTimeAsFileTime
HeapFree
HeapAlloc
GetCommandLineA
GetVersionExA
GetProcessHeap
RaiseException
RtlUnwind
LCMapStringA
LCMapStringW
GetCPInfo
GetProcAddress
GetModuleHandleA
ExitProcess
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
HeapSize
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetConsoleCP
GetConsoleMode
GetACP
GetOEMCP
IsValidCodePage
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
FlushFileBuffers
user32
wsprintfA
advapi32
LookupPrivilegeValueW
OpenProcessToken
AdjustTokenPrivileges
RegDeleteValueA
SetNamedSecurityInfoA
GetNamedSecurityInfoA
RegOpenKeyExA
RegCloseKey
RegEnumKeyExA
SetEntriesInAclA
BuildExplicitAccessWithNameA
shell32
SHGetSpecialFolderPathA
ShellExecuteA
SHChangeNotify
ole32
CoCreateGuid
CoInitialize
psapi
GetProcessImageFileNameA
iphlpapi
GetAdaptersInfo
wininet
InternetReadFile
InternetQueryOptionA
InternetCloseHandle
InternetConnectA
InternetSetOptionA
HttpSendRequestA
HttpOpenRequestA
InternetOpenA
HttpQueryInfoA
Sections
.text Size: 380KB - Virtual size: 379KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 92KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 690B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ