Static task
static1
Behavioral task
behavioral1
Sample
308d3dda1ab8a16b017aa6813053b3b2.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
308d3dda1ab8a16b017aa6813053b3b2.exe
Resource
win10v2004-20231215-en
General
-
Target
308d3dda1ab8a16b017aa6813053b3b2
-
Size
78KB
-
MD5
308d3dda1ab8a16b017aa6813053b3b2
-
SHA1
2599fb3bf0ae87bd9cbbe5d41dd5d55d10ac8390
-
SHA256
e26856ee8c058fbed5b35acadc7bfbe61a4bdc7b24c3e9c944adb4f953f5a109
-
SHA512
f97deea82dad7625a118d7bd4506282b74735f6f994ec05b2f896bd867da21ed92795dc13f2add01675ace92a01ec38eda4127e5621717707c051bf06b07835f
-
SSDEEP
1536:WdgF3iGc0QU87VeQ5hButGvwo/UQ4Z2ZlrS:vF3iGc0QUg32Gvj/UQ4ZqlrS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 308d3dda1ab8a16b017aa6813053b3b2
Files
-
308d3dda1ab8a16b017aa6813053b3b2.exe windows:4 windows x86 arch:x86
92894a50316ea94dcf5da346527ad4b4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
GetUserNameA
InitializeSecurityDescriptor
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
RegSetKeySecurity
RegSetValueExA
SetSecurityDescriptorDacl
kernel32
CreateDirectoryA
CreateMutexA
DeleteCriticalSection
EnterCriticalSection
ExitProcess
FreeLibrary
GetCommandLineA
GetComputerNameA
GetEnvironmentVariableA
GetLastError
GetModuleHandleA
GetProcAddress
GetStartupInfoA
GetSystemDirectoryA
GetVersionExA
GetWindowsDirectoryA
InitializeCriticalSection
InterlockedExchange
IsDBCSLeadByteEx
LeaveCriticalSection
LoadLibraryA
MultiByteToWideChar
SetUnhandledExceptionFilter
Sleep
TlsGetValue
VirtualProtect
VirtualQuery
WideCharToMultiByte
msvcrt
__getmainargs
__lc_codepage
__mb_cur_max
__p___argv
__p__environ
__p__fmode
__set_app_type
_cexit
_errno
_iob
_onexit
_setmode
_winmajor
abort
atexit
calloc
exit
fclose
fflush
fopen
fputc
fread
free
fseek
ftell
fwrite
getc
getenv
localeconv
malloc
memcpy
memset
perror
printf
putc
puts
remove
signal
strcat
strcpy
strlen
strncat
strncmp
strrchr
vfprintf
wcslen
shell32
ShellExecuteA
user32
CallNextHookEx
DispatchMessageA
GetAsyncKeyState
GetKeyState
GetKeyboardLayoutNameA
GetMessageA
SetWindowsHookExA
TranslateMessage
UnhookWindowsHookEx
ws2_32
WSACleanup
WSAStartup
closesocket
connect
gethostbyname
htons
recv
select
send
socket
Sections
.text Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 616B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.eh_fram Size: 512B - Virtual size: 220B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 8KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE