Static task
static1
Behavioral task
behavioral1
Sample
f96cb6e986ec37e080c7efae10319c69.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
f96cb6e986ec37e080c7efae10319c69.exe
Resource
win10v2004-20231222-en
General
-
Target
f96cb6e986ec37e080c7efae10319c69
-
Size
70KB
-
MD5
f96cb6e986ec37e080c7efae10319c69
-
SHA1
e08937f5131ca67cf3a08755b9ff6f620d8f05fd
-
SHA256
e7b422087ea881e77e765f6226d1cac4761a075c1d4e219e11e7a370e2a7962f
-
SHA512
d26d59f4bf20cbb39ac15fe7a7b68a519a51e7c6c7854ace390c31ec317aff46b161425d8ce6d91adcb65c9a7323295be3d9859fd44b99d8cdb1f49d17f9c1f1
-
SSDEEP
768:2k2DU/eNPPU1PRrNQtbDIKgUXcorYvoce1gLa1XFnToIf1XHEyvKaLC9b7:2kLmp2PR2tbDDX2LatFnToIfxvKak7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f96cb6e986ec37e080c7efae10319c69
Files
-
f96cb6e986ec37e080c7efae10319c69.exe windows:4 windows x86 arch:x86
3bf27b83e0c98731800c31d3281c474f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleFileNameA
FreeLibrary
GetProcAddress
LoadLibraryA
Process32Next
Module32First
Process32First
CreateToolhelp32Snapshot
TerminateProcess
OpenProcess
ExitProcess
CopyFileA
DeleteFileA
CreateThread
lstrcmpiA
WaitForSingleObject
MoveFileA
GetFileSize
CreateFileA
WriteFile
GetLogicalDriveStringsA
GetShortPathNameA
GetVersionExA
GetComputerNameA
GetTickCount
HeapAlloc
GetProcessHeap
GetCurrentProcessId
GetModuleHandleA
VirtualAlloc
VirtualQueryEx
ReadProcessMemory
GetThreadContext
SetThreadContext
WriteProcessMemory
VirtualProtectEx
VirtualFree
GetCurrentThreadId
GetEnvironmentVariableA
GlobalAlloc
LoadLibraryExA
GlobalFree
DeviceIoControl
lstrcpyA
lstrcatA
GetCurrentProcess
SetPriorityClass
GetCurrentThread
SetThreadPriority
ResumeThread
SetFileAttributesA
FindFirstFileA
FileTimeToLocalFileTime
FileTimeToSystemTime
GetLastError
ReadFile
FindNextFileA
FindClose
GetDriveTypeA
CreatePipe
GetStartupInfoA
GetSystemDirectoryA
CreateProcessA
CloseHandle
Sleep
GlobalMemoryStatus
user32
wsprintfA
MessageBoxA
GetSystemMetrics
SetThreadDesktop
OpenDesktopA
SetProcessWindowStation
OpenWindowStationA
GetThreadDesktop
CloseWindowStation
CloseDesktop
GetProcessWindowStation
GetDesktopWindow
SetCursorPos
keybd_event
ExitWindowsEx
mouse_event
gdi32
GetDIBits
BitBlt
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
CreateDCA
DeleteDC
DeleteObject
advapi32
AdjustTokenPrivileges
DeleteService
OpenSCManagerA
CreateServiceA
OpenServiceA
CloseServiceHandle
StartServiceA
RegisterServiceCtrlHandlerA
SetServiceStatus
LookupPrivilegeValueA
OpenProcessToken
StartServiceCtrlDispatcherA
ControlService
shell32
ShellExecuteA
SHGetFileInfoA
msvcrt
_acmdln
puts
printf
_strlwr
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
free
sprintf
strncpy
??2@YAPAXI@Z
__CxxFrameHandler
atoi
strcspn
strstr
??3@YAXPAX@Z
_ftol
fclose
fprintf
fopen
rand
memmove
malloc
__dllonexit
_onexit
_exit
_XcptFilter
exit
ws2_32
WSAStartup
setsockopt
sendto
htonl
WSASocketA
htons
socket
closesocket
recv
shutdown
inet_addr
gethostbyname
send
connect
Sections
.text Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ