Static task
static1
Behavioral task
behavioral1
Sample
50234e91e23b6175d02cf6cee581405f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
50234e91e23b6175d02cf6cee581405f.exe
Resource
win10v2004-20231215-en
General
-
Target
50234e91e23b6175d02cf6cee581405f
-
Size
452KB
-
MD5
50234e91e23b6175d02cf6cee581405f
-
SHA1
764293cdb27d972cb9fa6e0261e0b93d940caf98
-
SHA256
dd944a3bf672b06eaf0bd3783964b8564df704a63855cd563e40754a404480ec
-
SHA512
c353e3f2a9290d8117da103047d5e09db9d75c9d4874b56e93ccd3ef375ba9468b636e5ee51f999d7429dc9005f90fb5e0b4006226ec9c4f3fda1f205ceb747f
-
SSDEEP
3072:3lUimUCEjNdhWvHqZYo4fNUg49iCF0USaYvjdpKf0yBUQCJYhZ:3BmUlNdhWvHKYo4lG9iC5R4vKfdBUM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 50234e91e23b6175d02cf6cee581405f
Files
-
50234e91e23b6175d02cf6cee581405f.exe windows:4 windows x86 arch:x86
82685071243d17796cc5f1a2aa5a306e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
wininet
DeleteUrlCacheEntry
iphlpapi
GetAdaptersInfo
netapi32
Netbios
mfc42
ord690
ord2393
ord5207
ord389
ord2725
ord2086
ord6059
ord5265
ord4376
ord4853
ord4998
ord4710
ord2514
ord6052
ord4078
ord1775
ord4407
ord5241
ord2385
ord5163
ord6374
ord4353
ord5280
ord3798
ord4837
ord4441
ord2648
ord2055
ord6376
ord3749
ord5065
ord1727
ord6112
ord2446
ord2124
ord5277
ord4627
ord4425
ord3597
ord324
ord641
ord4234
ord765
ord2302
ord2645
ord6734
ord3005
ord3092
ord6197
ord6215
ord6199
ord755
ord470
ord6877
ord939
ord926
ord4129
ord4277
ord5683
ord6453
ord923
ord1168
ord2379
ord1146
ord6055
ord1776
ord5290
ord3402
ord3698
ord1576
ord1988
ord924
ord1134
ord2621
ord561
ord815
ord3738
ord4424
ord4622
ord4080
ord3079
ord3825
ord3831
ord3830
ord2976
ord3081
ord2985
ord3262
ord3136
ord4465
ord3259
ord3147
ord2982
ord5714
ord5289
ord5307
ord4698
ord4079
ord5302
ord5300
ord3346
ord2396
ord5199
ord1089
ord3922
ord5731
ord2512
ord2554
ord4486
ord6375
ord4274
ord4673
ord5861
ord6143
ord541
ord801
ord2818
ord537
ord1200
ord2764
ord941
ord4202
ord535
ord858
ord823
ord825
ord1105
ord860
ord540
ord800
ord5261
ord567
msvcrt
_initterm
__getmainargs
_acmdln
_XcptFilter
_exit
??1type_info@@UAE@XZ
_onexit
__dllonexit
?terminate@@YAXXZ
_except_handler3
atoi
exit
_splitpath
__setusermatherr
_mbscmp
strchr
strcat
sprintf
strcpy
free
_ftol
malloc
strlen
srand
rand
memset
memcpy
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
strcmp
_setmbcp
__CxxFrameHandler
_controlfp
kernel32
LoadResource
LockResource
SizeofResource
GetCurrentDirectoryA
WideCharToMultiByte
lstrcmpiA
SystemTimeToFileTime
lstrcpyA
lstrlenA
MultiByteToWideChar
LocalFileTimeToFileTime
lstrcmpA
SetFilePointer
IsBadReadPtr
CreateFileW
CreateFileA
WriteFile
SetFileTime
CloseHandle
CreateDirectoryW
CreateDirectoryA
GetLastError
ReadFile
GlobalAlloc
GlobalFree
DuplicateHandle
GetCurrentProcess
FileTimeToSystemTime
GetLocalTime
GetFileSize
GetFileInformationByHandle
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
DisableThreadLibraryCalls
GetTickCount
GetVersionExA
Process32Next
GetExitCodeProcess
TerminateProcess
GetPriorityClass
OpenProcess
Process32First
CreateToolhelp32Snapshot
ReleaseMutex
CreateMutexA
SetCurrentDirectoryA
GetModuleFileNameA
FindClose
FindNextFileA
DeleteFileA
RemoveDirectoryA
FindFirstFileA
Sleep
SetFileAttributesA
GetSystemDirectoryA
CreateProcessA
GetStartupInfoA
GetModuleHandleA
FindResourceA
user32
GetClientRect
EnableWindow
LoadIconA
IsIconic
FindWindowA
GetSystemMetrics
MessageBoxA
GetDesktopWindow
LoadStringW
SendMessageA
SetRect
DrawIcon
LoadStringA
PostMessageA
IsWindow
RegisterWindowMessageA
GetWindowRect
advapi32
RegCreateKeyExA
RegSetValueExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
shell32
SHGetSpecialFolderPathA
ShellExecuteExA
urlmon
URLDownloadToFileA
msvcirt
??6ostream@@QAEAAV0@PBD@Z
??0ofstream@@QAE@XZ
?openprot@filebuf@@2HB
?open@ofstream@@QAEXPBDHH@Z
??_Dofstream@@QAEXXZ
?close@ofstream@@QAEXXZ
Sections
.text Size: 80KB - Virtual size: 78KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 80KB - Virtual size: 79KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 284KB - Virtual size: 280KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ