Static task
static1
Behavioral task
behavioral1
Sample
35f7291181e305ff389af8a226f7c947.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
35f7291181e305ff389af8a226f7c947.exe
Resource
win10v2004-20231222-en
General
-
Target
35f7291181e305ff389af8a226f7c947
-
Size
35KB
-
MD5
35f7291181e305ff389af8a226f7c947
-
SHA1
5cd4e9d616c01edbb4a97ccd1bd240ef66192712
-
SHA256
7b9efdebc2f1ec3d054d3c26a03332eda7b2119375d818ba4d42c410aab70a63
-
SHA512
afdcaecedce5546b513f75549a44051bdfe1c22cf59ca40383e8c1db894688124361155995891b56475394502aacf7c23ea017ae62e727bf8943b56b399ea777
-
SSDEEP
768:VfgffwhokkJK8mOTniMkCSx/hz22DyV9T7A08SV:VfgghTUlTniMoxE19TE0h
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 35f7291181e305ff389af8a226f7c947
Files
-
35f7291181e305ff389af8a226f7c947.exe windows:1 windows x86 arch:x86
7cbaf474b5d8b8522f962c45ca08a036
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
wsock32
WSAStartup
connect
gethostbyaddr
gethostbyname
htons
inet_addr
recv
send
socket
wininet
InternetCloseHandle
InternetOpenA
InternetOpenUrlA
InternetReadFile
shell32
ShellExecuteA
kernel32
GetCommandLineA
GetFileSize
GetModuleFileNameA
GetModuleHandleA
GetProcessHeap
GetSystemDirectoryA
CloseHandle
GetTickCount
HeapAlloc
HeapFree
CopyFileA
OpenMutexA
CreateDirectoryA
ReadFile
RtlUnwind
RtlZeroMemory
CreateFileA
SetFilePointer
Sleep
WriteFile
CreateMutexA
lstrcatA
lstrcmpA
lstrcmpiA
lstrcpyA
lstrcpynA
lstrlenA
CreateThread
user32
wsprintfA
advapi32
RegCreateKeyExA
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
crtdll
__GetMainArgs
exit
memset
raise
rand
signal
srand
strchr
strstr
strtok
Sections
.text Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 22KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE