Static task
static1
Behavioral task
behavioral1
Sample
f9e890b1840695c9e81445cbdd8106e4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
f9e890b1840695c9e81445cbdd8106e4.exe
Resource
win10v2004-20231222-en
General
-
Target
f9e890b1840695c9e81445cbdd8106e4
-
Size
13KB
-
MD5
f9e890b1840695c9e81445cbdd8106e4
-
SHA1
2ad7f2541cfd2f0e570a4c381877bc8a78f61182
-
SHA256
bd212f7821ae0f7a2e4fca958f5744d18d9109eca34111a6be45e1b1ea0eec62
-
SHA512
1cd7b4e05191adef07f4770942a56aff83f2e92b64976ec061b4b22b22e7d3427e25ac3f1d4441a2191a6e0dc20a890daf6a192d77da36c268601609785bdf33
-
SSDEEP
192:28zYAc8d2M2dww2yvRGQ51iq10spXtNz/Vvo4AbvzJQhbjpBS1mbDAVlDRh:zzYi01RGOQsbNvU2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f9e890b1840695c9e81445cbdd8106e4
Files
-
f9e890b1840695c9e81445cbdd8106e4.exe windows:4 windows x86 arch:x86
2e8978f1dab9e0db20038cce5722dec6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetSystemDirectoryA
GetTempFileNameA
GetTempPathA
CloseHandle
GetFileSize
WriteFile
CreateFileA
DeleteFileA
FreeLibrary
GetLastError
lstrcatA
WaitForSingleObject
CreateThread
WinExec
CreateMutexA
GetVersionExA
lstrcmpiA
SetFileAttributesA
GetTickCount
ReadFile
SetFilePointer
CopyFileA
LoadLibraryA
GetProcAddress
GetCurrentProcess
Sleep
OutputDebugStringA
user32
ShowWindow
GetWindowLongA
FindWindowA
wsprintfA
advapi32
LookupPrivilegeValueA
OpenProcessToken
RegCloseKey
RegSetValueExA
RegCreateKeyA
AdjustTokenPrivileges
wininet
DeleteUrlCacheEntry
msvcp60
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?rfind@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
?substr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV12@II@Z
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@PBDABV10@@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??0?$basic_ifstream@DU?$char_traits@D@std@@@std@@QAE@XZ
?open@?$basic_filebuf@DU?$char_traits@D@std@@@std@@QAEPAV12@PBDH@Z
?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QAEXH_N@Z
??0Init@ios_base@std@@QAE@XZ
??1Init@ios_base@std@@QAE@XZ
??0_Winit@std@@QAE@XZ
??1_Winit@std@@QAE@XZ
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??1?$basic_ios@DU?$char_traits@D@std@@@std@@UAE@XZ
??1?$basic_ifstream@DU?$char_traits@D@std@@@std@@UAE@XZ
??_D?$basic_ifstream@DU?$char_traits@D@std@@@std@@QAEXXZ
?close@?$basic_ifstream@DU?$char_traits@D@std@@@std@@QAEXXZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?getline@std@@YAAAV?$basic_istream@DU?$char_traits@D@std@@@1@AAV21@AAV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@1@@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
shell32
ShellExecuteA
msvcrt
malloc
_onexit
__dllonexit
_except_handler3
fopen
fwrite
fclose
fread
atoi
__CxxFrameHandler
time
localtime
strlen
memcpy
memset
_itoa
strchr
strcpy
sprintf
strcat
Sections
.text Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.CRT Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE