Static task
static1
Behavioral task
behavioral1
Sample
61754cb03d3f68c577acf8817755a364.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
61754cb03d3f68c577acf8817755a364.exe
Resource
win10v2004-20231215-en
General
-
Target
61754cb03d3f68c577acf8817755a364
-
Size
176KB
-
MD5
61754cb03d3f68c577acf8817755a364
-
SHA1
4b5b5eb393ce6a658895981a41572d91bf0c7bf7
-
SHA256
e4398b54d950e74e98567f4ac4881ebaee544a492d00317e2d063bab2dc58c9a
-
SHA512
0950d572c0f36c914e5b3ddd94905deed06d720f2c34cea92e1855d24c58d91808f0f543182f7f2695066fe1e26d116565fbd484055849d4bbfce6a651fb7673
-
SSDEEP
3072:Iraiun+mzPZHD/CBGNwPif7nPHSh33yBzZAK+fO:Iraiu+u1r+Hgfz6Zm
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 61754cb03d3f68c577acf8817755a364
Files
-
61754cb03d3f68c577acf8817755a364.exe windows:4 windows x86 arch:x86
9770123f51edff2d838b486574c5e89d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetSystemDirectoryA
GetLastError
CreateFileA
SetFileTime
GetFileAttributesExA
WinExec
GetModuleFileNameA
GetVersionExA
DuplicateHandle
GetCurrentProcess
OpenProcess
WriteFile
GetStartupInfoA
GetModuleHandleA
WideCharToMultiByte
CreateProcessA
WaitForSingleObject
TerminateProcess
CloseHandle
LoadLibraryA
GetProcAddress
Sleep
FreeLibrary
user32
PostMessageA
EnumChildWindows
GetWindowThreadProcessId
GetClassNameA
DefWindowProcA
PostQuitMessage
ShowWindow
CreateWindowExA
DispatchMessageA
GetDesktopWindow
TranslateMessage
GetMessageA
RegisterWindowMessageA
SendMessageTimeoutA
EnumWindows
RegisterClassExA
advapi32
LookupAccountNameA
OpenSCManagerA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
CreateServiceA
DeleteService
OpenServiceA
StartServiceA
ConvertSidToStringSidA
GetUserNameA
CloseServiceHandle
shell32
SHGetSpecialFolderPathA
ole32
CoInitialize
CoUninitialize
oleaut32
SysFreeString
VariantClear
msvcrt
_access
_strlwr
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
time
srand
??2@YAPAXI@Z
??3@YAXPAX@Z
_stricmp
fclose
fflush
fwrite
fopen
wcslen
atoi
strchr
strstr
rand
__CxxFrameHandler
sprintf
shlwapi
SHGetValueA
SHSetValueA
dbghelp
ImageNtHeader
Sections
.text Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 120KB - Virtual size: 117KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
odata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ndata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
mdata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
edata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
cdata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
idata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ