Static task
static1
Behavioral task
behavioral1
Sample
569c444241296db128c21b0f35a146ab.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
569c444241296db128c21b0f35a146ab.exe
Resource
win10v2004-20231215-en
General
-
Target
569c444241296db128c21b0f35a146ab
-
Size
41KB
-
MD5
569c444241296db128c21b0f35a146ab
-
SHA1
4a45080b9a453283d3bfadf12a02dfb5959aa940
-
SHA256
47c2ec1f8ba74b9a0a67f14eecf577d7b4ff3d91be2d9d64d41fbda368135cff
-
SHA512
ac6383220c2083d95c37a3cf3684ab0c9953592a186f9027abc7e05c2dec9dc2c6c37094ea9bedd06af6ff999d38ffb98df6f690bc847624e92d96c0a9b4eabc
-
SSDEEP
768:2CUUsb2/BxO0JtdJoqXLSdabeHn0hKsC51kracD1VnJAJTAG:21Uv/n7zJoqWdbn00GOcpVJAJTA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 569c444241296db128c21b0f35a146ab
Files
-
569c444241296db128c21b0f35a146ab.exe windows:5 windows x86 arch:x86
5d59935744c2951aba607e801e09dcde
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
psapi
EnumProcessModules
GetModuleFileNameExA
GetProcessImageFileNameA
userenv
GetAllUsersProfileDirectoryA
iphlpapi
GetAdaptersInfo
wininet
InternetReadFile
InternetCloseHandle
HttpSendRequestA
InternetSetOptionA
HttpAddRequestHeadersA
HttpOpenRequestA
InternetQueryOptionA
InternetCrackUrlA
InternetOpenA
InternetConnectA
ws2_32
WSACleanup
WSAStartup
closesocket
connect
gethostbyname
htons
socket
shlwapi
wnsprintfA
kernel32
TerminateThread
GetExitCodeProcess
WriteProcessMemory
GetTickCount
GetSystemDirectoryA
GetVolumeInformationA
WideCharToMultiByte
lstrcpynA
GetCurrentProcess
Sleep
CreateThread
CopyFileA
lstrcpyA
lstrcmpiA
GetEnvironmentVariableA
lstrlenA
HeapFree
HeapAlloc
GetProcessHeap
GetLastError
OpenProcess
Process32Next
GetCurrentProcessId
CloseHandle
Process32First
CreateToolhelp32Snapshot
CreateProcessA
VirtualAlloc
ResumeThread
SetThreadContext
GetThreadContext
GetTempFileNameA
TerminateProcess
VirtualAllocEx
VirtualFree
lstrcatA
CreateRemoteThread
WaitForSingleObject
ReadFile
GetFileSize
CreateFileA
CreateMutexA
GetModuleFileNameA
QueryPerformanceCounter
ExitProcess
WriteFile
SetUnhandledExceptionFilter
user32
wsprintfA
advapi32
CryptEncrypt
RegSetValueExA
RegOpenKeyExA
RegDeleteValueA
OpenProcessToken
RegQueryValueExA
CryptReleaseContext
GetTokenInformation
CreateWellKnownSid
EqualSid
CryptDecrypt
RegCloseKey
CryptAcquireContextA
CryptGenKey
CryptExportKey
CryptDestroyKey
CryptImportKey
ole32
CoUninitialize
CoInitialize
CoTaskMemFree
StringFromCLSID
CoCreateInstance
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 21KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 29KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
rdncnry Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE