Static task
static1
Behavioral task
behavioral1
Sample
509c39d656c49bbcfd2c59f338234384.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
509c39d656c49bbcfd2c59f338234384.exe
Resource
win10v2004-20231215-en
General
-
Target
509c39d656c49bbcfd2c59f338234384
-
Size
2.9MB
-
MD5
509c39d656c49bbcfd2c59f338234384
-
SHA1
90d5c5b6daccf1ec44c700926b9f97fce78503d9
-
SHA256
ddc7355c9ef0c001f8162fa00cd338033759dc490a7a8dc25e07b4fc748a7aae
-
SHA512
c734ee1467b20045a276c4b6301a005e47f22412f82ed5075b3cc89ddf6fc845a4bf1ea3ad9593f0c5b6c7b7e3d626e0cbef09d8658da155707bb8d21a8091b4
-
SSDEEP
49152:UHFDTEDKvnFAXoaDbWXgkWPRJ6sp2wtqpt97u0Pe75YU4XJGxHOMs4k:UHFsD4nFAXbbWQklYtSk0m5X8KOlT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 509c39d656c49bbcfd2c59f338234384
Files
-
509c39d656c49bbcfd2c59f338234384.exe windows:4 windows x86 arch:x86
4ebc77aca7f19ab94b28e538eae69019
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLocaleInfoA
EnumSystemLocalesA
GetUserDefaultLCID
VirtualAlloc
IsBadWritePtr
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
SetStdHandle
FlushFileBuffers
CreateProcessA
CompareStringW
SetEnvironmentVariableA
GetStringTypeA
GetStringTypeW
GetLocaleInfoW
GetCurrentDirectoryW
DeleteFileA
WaitForSingleObject
CompareStringA
GetExitCodeProcess
IsValidCodePage
IsValidLocale
GetCPInfo
LCMapStringW
LCMapStringA
MultiByteToWideChar
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentVariableA
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
HeapFree
HeapSize
HeapAlloc
HeapReAlloc
WideCharToMultiByte
GetVersion
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
GetOEMCP
GetTickCount
Sleep
GetCurrentDirectoryA
CloseHandle
SetEndOfFile
SetFilePointer
CompareFileTime
FileTimeToLocalFileTime
FileTimeToDosDateTime
SystemTimeToFileTime
GetLocalTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
SetFileTime
WriteFile
GetACP
ReadFile
GetFileSize
GetLastError
LocalFree
GetFullPathNameW
GetFullPathNameA
GetTempPathW
GetModuleFileNameW
MoveFileW
CopyFileW
DeleteFileW
GetFileAttributesW
CreateDirectoryW
SetCurrentDirectoryW
SetCurrentDirectoryA
SetFileAttributesW
GetFileTime
GetTimeZoneInformation
CreateFileW
MoveFileA
CopyFileA
GetFileAttributesA
FormatMessageA
GetTempPathA
GetModuleFileNameA
CreateDirectoryA
SetFileAttributesA
CreateFileA
GetVersionExA
GetProcAddress
LoadLibraryA
LocalAlloc
FreeLibrary
RtlUnwind
ExitProcess
TerminateProcess
GetCurrentProcess
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
user32
RegisterClassExW
LoadCursorA
DialogBoxParamW
CreateWindowExW
SetWindowPos
OffsetRect
LoadStringW
GetMessageA
DispatchMessageA
MessageBoxA
GetDlgItem
SendMessageA
TranslateMessage
PostMessageA
SetTimer
GetDlgItemTextA
LoadStringA
DefWindowProcA
DestroyWindow
BeginPaint
EndPaint
GetDlgItemTextW
SetWindowTextW
MoveWindow
SetDlgItemTextW
EnableWindow
SetDlgItemTextA
EndDialog
PostQuitMessage
MessageBoxW
GetDesktopWindow
GetWindowRect
CopyRect
shell32
SHGetPathFromIDListW
SHBrowseForFolderW
SHGetMalloc
ShellExecuteExW
crypt32
CertNameToStrA
CertFreeCertificateContext
CryptDecodeObject
CertCloseStore
ws2_32
WSAGetLastError
socket
inet_addr
htons
setsockopt
gethostbyname
connect
WSAStartup
ioctlsocket
select
bind
closesocket
shutdown
send
recv
wininet
InternetCombineUrlA
advapi32
RegOpenKeyExA
CryptAcquireContextA
CryptReleaseContext
GetUserNameA
RegQueryValueExA
RegCloseKey
CryptGenRandom
oleaut32
SysFreeString
SysAllocString
SysStringLen
Sections
.text Size: 472KB - Virtual size: 468KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 64KB - Virtual size: 62KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 104KB - Virtual size: 119KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 188KB - Virtual size: 185KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ