Static task
static1
Behavioral task
behavioral1
Sample
17422a068a2c35aca846d799da9c0557.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
17422a068a2c35aca846d799da9c0557.exe
Resource
win10v2004-20231215-en
General
-
Target
17422a068a2c35aca846d799da9c0557
-
Size
879KB
-
MD5
17422a068a2c35aca846d799da9c0557
-
SHA1
e0c34cae4f34686a8195971896fa52a05a7d6eb1
-
SHA256
c6e8fe6ca9972722342ecef0af2c213a7138cdbff27acde6a6fb59b54a26de15
-
SHA512
5d39adc4965267fdb4ab772b1825a4914e8c11974f40d56cf51b0b4d41514b1d61c493506fa1e9a6ef47f29737e55ad2fa4c52c92b4e0a87d4d5ac920ae24268
-
SSDEEP
3072:mu6BqmmBWzo0f66Sg9e+AKS9M23f+Gp0sTQ:bAt663edKSj3WGp9Q
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 17422a068a2c35aca846d799da9c0557
Files
-
17422a068a2c35aca846d799da9c0557.exe windows:1 windows x86 arch:x86
bd4148ee333e7cc0533aeb4aa74b8014
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
wsock32
WSAAsyncSelect
WSAGetLastError
WSAStartup
__WSAFDIsSet
accept
bind
closesocket
connect
gethostbyname
htonl
htons
inet_addr
ioctlsocket
listen
recv
select
send
socket
ole32
CoCreateInstance
CLSIDFromString
CoTaskMemFree
CoInitialize
CoUninitialize
oleaut32
SysAllocString
kernel32
ExitThread
ExpandEnvironmentStringsA
FindFirstFileA
FindNextFileA
FreeLibrary
GetCommandLineA
GetComputerNameA
GetCurrentProcessId
GetCurrentThreadId
GetDiskFreeSpaceExA
GetDriveTypeA
GetExitCodeThread
GetFileSize
GetFileTime
GetLocalTime
GetLocaleInfoA
GetModuleFileNameA
GetModuleHandleA
CloseHandle
GetProcAddress
GetSystemDirectoryA
GetTempPathA
GetTickCount
GetVersion
GetVersionExA
GetVolumeInformationA
GetWindowsDirectoryA
GlobalMemoryStatus
CopyFileA
InterlockedIncrement
IsBadReadPtr
IsBadWritePtr
LoadLibraryA
LocalAlloc
LocalFree
OpenMutexA
OpenProcess
CreateFileA
ReadFile
ReadProcessMemory
RtlUnwind
SetFilePointer
SetFileTime
SetUnhandledExceptionFilter
CreateMutexA
Sleep
TerminateProcess
TerminateThread
VirtualQuery
CreateProcessA
WaitForSingleObject
WideCharToMultiByte
WinExec
WriteFile
WriteProcessMemory
lstrlenA
lstrlenW
CreateThread
DeleteFileA
user32
SetWindowTextA
GetWindowTextA
FindWindowA
GetForegroundWindow
SetTimer
KillTimer
RegisterClassA
GetMessageA
CreateDesktopA
SetThreadDesktop
GetThreadDesktop
TranslateMessage
DispatchMessageA
SendMessageA
CharUpperBuffA
CreateWindowExA
DefWindowProcA
advapi32
GetUserNameA
CloseServiceHandle
CreateServiceA
DeleteService
OpenSCManagerA
OpenServiceA
RegisterServiceCtrlHandlerA
SetServiceStatus
StartServiceA
StartServiceCtrlDispatcherA
RegCreateKeyExA
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
GetSecurityInfo
SetSecurityInfo
SetEntriesInAclA
crtdll
_itoa
__GetMainArgs
_sleep
atoi
exit
memcpy
memmove
memset
raise
rand
signal
sprintf
srand
strcat
strchr
Sections
.text Size: 48KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bss Size: 784KB - Virtual size: 784KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.neolit Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE