Static task
static1
Behavioral task
behavioral1
Sample
04d3540a1bf5fb59873bad9a6ea0d837.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
04d3540a1bf5fb59873bad9a6ea0d837.exe
Resource
win10v2004-20231215-en
General
-
Target
04d3540a1bf5fb59873bad9a6ea0d837
-
Size
44KB
-
MD5
04d3540a1bf5fb59873bad9a6ea0d837
-
SHA1
5032ee3a2397490e94271829847a4cc3ec892f78
-
SHA256
95cafabba9bca6a0c165286381d56240b5aac5cf561401c33752c1d60b2632ef
-
SHA512
7147f2cb002f5be0c38ef265d4d09749794758cd12379d51f2bdaaafe0829b49f13b4de982da7dd3105b7443cd65dd96575c654ac9e55eb21279b7003bbddb56
-
SSDEEP
768:ack00gfkJBIVIEhECzLHUgSW2ACdh6aGIdSm9BU:ac6gfkJKKCzogkAJut9O
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 04d3540a1bf5fb59873bad9a6ea0d837
Files
-
04d3540a1bf5fb59873bad9a6ea0d837.exe windows:4 windows x86 arch:x86
e341ef5e5e91de755eae7fc5bf982399
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ResumeThread
SetThreadPriority
GetCurrentThread
SetPriorityClass
GetCurrentProcess
lstrcatA
lstrcpyA
GetEnvironmentVariableA
GetShortPathNameA
GetModuleFileNameA
lstrlenA
GetLastError
SetFileAttributesA
GetSystemDirectoryA
SetFileTime
WriteFile
GetFileTime
CreateFileA
GlobalFree
LockResource
GlobalAlloc
LoadResource
SizeofResource
FindResourceA
GetModuleHandleA
GetStartupInfoA
CreateProcessA
DeleteFileA
LoadLibraryA
GetProcAddress
GetComputerNameA
GetVersionExA
GetProcessHeap
HeapAlloc
GetTickCount
GetCurrentProcessId
CreateThread
ExitThread
TerminateThread
CloseHandle
GetDriveTypeA
CopyFileA
Sleep
user32
wsprintfA
advapi32
CreateServiceA
StartServiceA
RegOpenKeyA
RegSetValueExA
CloseServiceHandle
StartServiceCtrlDispatcherA
RegisterServiceCtrlHandlerA
SetServiceStatus
OpenSCManagerA
OpenServiceA
DeleteService
GetUserNameA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
ControlService
shell32
ShellExecuteA
mfc42
ord2770
ord537
ord1168
ord2915
ord800
ord924
ord941
ord536
ord3178
ord4058
ord2781
ord668
ord610
ord926
ord6139
ord287
ord356
ord860
ord540
ord6877
ord939
ord2818
ord4278
ord6663
ord858
ord535
ord922
msvcrt
srand
time
printf
free
malloc
fclose
fwrite
fopen
strtok
exit
_except_handler3
strstr
strncmp
__dllonexit
_onexit
_exit
_XcptFilter
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
atoi
__CxxFrameHandler
rand
urlmon
URLDownloadToFileA
msvcp60
??1_Winit@std@@QAE@XZ
??1Init@ios_base@std@@QAE@XZ
??0_Winit@std@@QAE@XZ
??0Init@ios_base@std@@QAE@XZ
ws2_32
WSAGetLastError
send
gethostbyname
closesocket
connect
htons
inet_addr
socket
sendto
setsockopt
WSASocketA
WSAStartup
gethostname
inet_ntoa
htonl
recv
Sections
.text Size: 24KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 247KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ