Static task
static1
Behavioral task
behavioral1
Sample
602bbb129ea76bff89bc2de2aa113bbf.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
602bbb129ea76bff89bc2de2aa113bbf.exe
Resource
win10v2004-20231215-en
General
-
Target
602bbb129ea76bff89bc2de2aa113bbf
-
Size
112KB
-
MD5
602bbb129ea76bff89bc2de2aa113bbf
-
SHA1
0f77ab1a859f0990f60c8be454724a18f29bc6b6
-
SHA256
e980bbbea57a12c95c271b1bf68be0cadd169a97b77bb2ef8c3e2e2f9ad0f21a
-
SHA512
6f7d5a4b420f45b056da238b10005b3eb949c17dfc87ece2d6bda98916a419ece000e3cbb922ab4812e296dfcaf4739d3117d7794c9b0353128f8d62826fe93d
-
SSDEEP
1536:U8z4d5BcJNkHYD3oybTFkP7MJPZAy2kQ7onoxL8yKQBpKIR5aLu:UECnGFbTKYVqonoq6pKcaLu
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 602bbb129ea76bff89bc2de2aa113bbf
Files
-
602bbb129ea76bff89bc2de2aa113bbf.exe windows:4 windows x86 arch:x86
892578e6f5b99e918fa201b3074afaa8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetVolumeInformationA
GetDriveTypeA
GetLogicalDrives
CreateProcessA
GetCurrentProcessId
GetTickCount
WaitForSingleObject
TerminateProcess
GetExitCodeProcess
ReadFile
FindClose
FindNextFileA
FindFirstFileA
GetVersionExA
GlobalMemoryStatus
Beep
GetLogicalDriveStringsA
CreateThread
GetSystemDirectoryA
Process32First
CreateToolhelp32Snapshot
GetLastError
CreateRemoteThread
WriteProcessMemory
VirtualAllocEx
VirtualFreeEx
OpenProcess
GetModuleHandleA
SetStdHandle
LoadLibraryA
GetProcAddress
IsBadWritePtr
HeapReAlloc
VirtualAlloc
HeapAlloc
GetPrivateProfileStringA
GetFileSize
DeleteFileA
SetFilePointer
GetVersion
GetCurrentProcess
ExitProcess
GetCurrentThreadId
CloseHandle
GetModuleFileNameA
GetWindowsDirectoryA
WinExec
Sleep
SetFileAttributesA
CopyFileA
GetLocalTime
CreateFileA
WriteFile
Process32Next
GetOEMCP
GetACP
GetCPInfo
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
MultiByteToWideChar
RtlUnwind
HeapFree
VirtualFree
HeapCreate
HeapDestroy
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
GetStartupInfoA
GetCommandLineA
UnhandledExceptionFilter
FreeEnvironmentStringsA
FlushFileBuffers
user32
PostThreadMessageA
ShowWindow
GetParent
GetWindowThreadProcessId
EnumWindows
ExitWindowsEx
advapi32
DeleteService
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
ChangeServiceConfigA
RegisterServiceCtrlHandlerA
ControlService
OpenServiceA
SetServiceStatus
OpenSCManagerA
CreateServiceA
CloseServiceHandle
ChangeServiceConfig2A
StartServiceA
StartServiceCtrlDispatcherA
ws2_32
setsockopt
sendto
inet_addr
socket
WSASocketA
closesocket
gethostbyname
connect
send
recv
accept
listen
bind
gethostname
WSACleanup
WSAStartup
htons
shlwapi
PathFileExistsA
Sections
.text Size: 48KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE