Static task
static1
Behavioral task
behavioral1
Sample
376e10e5dcb116851e9f0aaaf1abfe8d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
376e10e5dcb116851e9f0aaaf1abfe8d.exe
Resource
win10v2004-20231215-en
General
-
Target
376e10e5dcb116851e9f0aaaf1abfe8d
-
Size
184KB
-
MD5
376e10e5dcb116851e9f0aaaf1abfe8d
-
SHA1
2632440606121289eea22b32b96557e10aa4c74b
-
SHA256
cfed3baadda9e04080c8be61a5f1bc99c89b8bc335e56bc0956c7545f4ff9d3a
-
SHA512
c84e64a94bd56e7a57d81afc7d477d1193dd234aad75b491a41e5b3166ece13b59a0565d7ad94897e5be6fbb291c6b3c75a40a1227645624452124e42a1583e7
-
SSDEEP
3072:4ho62TPr57qcP3fz/hOqjzf6HwF8BC39a1kMEVamgZ+Y4Mlvou6CVZe0TASvZfQG:5TN53bhg5C3RQAY4WR6CvTASR/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 376e10e5dcb116851e9f0aaaf1abfe8d
Files
-
376e10e5dcb116851e9f0aaaf1abfe8d.exe windows:4 windows x86 arch:x86
207c262cf55b7093cf9efc8c388bdec9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
gethostname
gethostbyname
inet_ntoa
inet_addr
connect
WSACleanup
WSAStartup
socket
setsockopt
ioctlsocket
htons
bind
listen
send
select
__WSAFDIsSet
accept
recv
closesocket
kernel32
UnmapViewOfFile
SetEnvironmentVariableA
CompareStringW
CompareStringA
SetEndOfFile
FlushFileBuffers
SetStdHandle
GetStringTypeW
GetStringTypeA
RtlUnwind
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetOEMCP
GetACP
ExitThread
GetTickCount
QueryPerformanceCounter
QueryPerformanceFrequency
GetSystemDirectoryA
GetLocalTime
Sleep
MultiByteToWideChar
ReadFile
CloseHandle
WriteFile
TransactNamedPipe
CreateFileA
GetModuleFileNameA
GetTimeFormatA
GetDateFormatA
GetLastError
CreateThread
GetFileSize
GetFileAttributesA
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
FindNextFileA
FindFirstFileA
SetFilePointer
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
FreeLibrary
GetEnvironmentVariableW
GetProcAddress
LoadLibraryA
HeapFree
HeapAlloc
GetProcessHeap
VirtualQueryEx
ReadProcessMemory
GetSystemInfo
OpenProcess
GetModuleHandleA
FormatMessageA
GlobalUnlock
GlobalLock
MapViewOfFile
CreateFileMappingA
SetFileTime
GetFileTime
CreateProcessA
ExpandEnvironmentStringsA
SetFileAttributesA
GetTempPathA
GetExitCodeProcess
PeekNamedPipe
DuplicateHandle
GetCurrentProcess
CreatePipe
GetVersionExA
GlobalMemoryStatus
ExitProcess
WideCharToMultiByte
GetComputerNameA
TerminateProcess
DeleteFileA
GetCurrentProcessId
CopyFileA
WaitForSingleObject
CreateMutexA
TerminateThread
MoveFileA
SetConsoleCtrlHandler
GetLocaleInfoA
GetLogicalDrives
WaitForMultipleObjects
GenerateConsoleCtrlEvent
GetTimeZoneInformation
GetSystemTime
HeapReAlloc
GetStartupInfoA
GetCommandLineA
GetVersion
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
LCMapStringA
LCMapStringW
GetCPInfo
Sections
.text Size: 119KB - Virtual size: 119KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 48KB - Virtual size: 364KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
XOR Size: - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE