Static task
static1
Behavioral task
behavioral1
Sample
0642e90e98e4bad5feab21fe55bc4baa.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0642e90e98e4bad5feab21fe55bc4baa.exe
Resource
win10v2004-20231222-en
General
-
Target
0642e90e98e4bad5feab21fe55bc4baa
-
Size
406KB
-
MD5
0642e90e98e4bad5feab21fe55bc4baa
-
SHA1
f5b77a1f071f38f897b4ca5e6b1b3265bed7f245
-
SHA256
40b3b35899f66be285091e68e5013aa216bc3fbcd4ee8105a1426f30c9824bfc
-
SHA512
adbd2e6b3ff319658686aa44e6ef592c3b678d26a8fbc1e23d7482ed234c8e30935685c3773060d9d64139828ad1e033a35f41a5e0ac7e74fe606f3df2fc56bd
-
SSDEEP
3072:tGR79TBFJkEJC64phd4fP649XaNlyHhEEDAZvvPTgea12BoyJ4pdYL7x:tqTHBEEDqvbgerX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0642e90e98e4bad5feab21fe55bc4baa
Files
-
0642e90e98e4bad5feab21fe55bc4baa.exe windows:4 windows x86 arch:x86
bd547c86665802feea853d195cf68e85
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DeleteFileA
ReleaseMutex
CreateProcessA
GetTempPathA
GetLastError
CreateMutexA
GetModuleFileNameA
CreateDirectoryA
RemoveDirectoryA
GetComputerNameA
WritePrivateProfileStringA
GetSystemTime
GetFileTime
FileTimeToSystemTime
Sleep
GetFileSize
WaitForSingleObject
GetLocalTime
GetDiskFreeSpaceA
SystemTimeToFileTime
CopyFileA
GetWindowsDirectoryA
DeviceIoControl
CompareFileTime
GetPrivateProfileStringA
GetVolumeInformationA
ResumeThread
CreateThread
GetCommandLineW
TerminateProcess
OpenProcess
GetCurrentProcess
Process32Next
Process32First
CreateToolhelp32Snapshot
FindFirstFileA
FindNextFileA
FindClose
SetFileAttributesA
CreateFileA
GetFileAttributesA
GetFileInformationByHandle
CloseHandle
FileTimeToLocalFileTime
FileTimeToDosDateTime
GetDriveTypeA
HeapAlloc
HeapFree
GetFileType
ReadFile
WriteFile
SetFilePointer
RtlUnwind
RaiseException
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
IsBadWritePtr
SetEndOfFile
SetHandleCount
GetStdHandle
SetStdHandle
HeapSize
SetUnhandledExceptionFilter
GetProcAddress
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
GetCPInfo
GetACP
GetOEMCP
IsBadReadPtr
IsBadCodePtr
FlushFileBuffers
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
LoadLibraryA
LCMapStringA
LCMapStringW
CompareStringA
CompareStringW
SetEnvironmentVariableA
advapi32
RegSetValueExA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegOpenKeyExA
shell32
ShellExecuteA
CommandLineToArgvW
cabinet
FCICreate
FCIDestroy
FCIAddFile
FCIFlushCabinet
psapi
EnumProcessModules
GetModuleFileNameExA
Sections
.text Size: 88KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 298KB - Virtual size: 298KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ydtbtyb Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE