Static task
static1
Behavioral task
behavioral1
Sample
018f6a7c16df64f48e6205632ef9bf75.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
018f6a7c16df64f48e6205632ef9bf75.exe
Resource
win10v2004-20231215-en
General
-
Target
018f6a7c16df64f48e6205632ef9bf75
-
Size
32KB
-
MD5
018f6a7c16df64f48e6205632ef9bf75
-
SHA1
7720071e7420ccad8d040bfa6272d0707befe705
-
SHA256
cd872dc3d08b3654535bfb30230db89fa4c98327a61223492cb18d7104619795
-
SHA512
9552b03a09ea26d8285ebb5a6012e00c850405dca1c5e1033138871ef794649bfda28b5c82cd3c3d7bc611f575a25bf9546bf737c4ccd339deb1e9da48853a76
-
SSDEEP
768:qiPlLXWnoGHsFnVgASq6p0CFaUD3p6pXK9a:VPClsTgAe0CFN6pXEa
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 018f6a7c16df64f48e6205632ef9bf75
Files
-
018f6a7c16df64f48e6205632ef9bf75.exe windows:4 windows x86 arch:x86
7a03bd5513c78b61c3c218b6997db3c4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
WSASocketA
htonl
sendto
inet_addr
WSAGetLastError
WSAAsyncSelect
WSAStartup
getprotobyname
socket
gethostbyname
setsockopt
htons
connect
send
recv
closesocket
WSACleanup
kernel32
WriteProcessMemory
VirtualAllocEx
GetProcAddress
GetModuleHandleA
VirtualProtectEx
VirtualAlloc
lstrcatA
HeapFree
HeapAlloc
GetProcessHeap
SetThreadContext
WideCharToMultiByte
MultiByteToWideChar
GetSystemDirectoryA
GetTickCount
SetPriorityClass
GetCurrentProcess
FreeLibrary
GetCurrentProcessId
LoadLibraryA
GetVersion
CreateThread
Sleep
CloseHandle
CreateMutexA
ExitProcess
GetCommandLineA
GetModuleFileNameA
DeleteFileA
MoveFileA
GlobalMemoryStatus
GetVersionExA
ResumeThread
GetFileAttributesA
GetCurrentThreadId
WriteFile
CreateFileA
TerminateProcess
CreateProcessA
GetThreadContext
ReadProcessMemory
VirtualQueryEx
GetStartupInfoA
GetLastError
GetComputerNameA
user32
PostQuitMessage
DefWindowProcA
RegisterClassA
CreateWindowExA
ExitWindowsEx
UpdateWindow
GetMessageA
TranslateMessage
DispatchMessageA
PostThreadMessageA
GetInputState
ShowWindow
advapi32
AdjustTokenPrivileges
RegDeleteKeyA
OpenProcessToken
LookupPrivilegeValueA
RegOpenKeyA
RegCreateKeyA
RegSetValueA
RegSetValueExA
RegCloseKey
GetUserNameA
LookupAccountNameA
GetFileSecurityA
InitializeSecurityDescriptor
GetSecurityDescriptorDacl
GetAclInformation
GetLengthSid
InitializeAcl
GetAce
SetFileSecurityA
GetSecurityDescriptorControl
SetSecurityDescriptorDacl
AddAccessAllowedAce
AddAce
EqualSid
msvcp60
??0Init@ios_base@std@@QAE@XZ
??0_Winit@std@@QAE@XZ
??1_Winit@std@@QAE@XZ
??1Init@ios_base@std@@QAE@XZ
wininet
InternetOpenA
InternetOpenUrlA
InternetReadFile
InternetCloseHandle
netapi32
NetUserGetLocalGroups
NetApiBufferFree
msvcrt
fopen
fclose
fseek
ftell
_itoa
_except_handler3
sprintf
memset
rand
strstr
atoi
strncpy
strcspn
strlen
strcat
strcpy
__CxxFrameHandler
malloc
_strlwr
memcpy
fread
Sections
.text Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE