Static task
static1
Behavioral task
behavioral1
Sample
044714798b4d1e6cbb71ee38376e5847.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
044714798b4d1e6cbb71ee38376e5847.exe
Resource
win10v2004-20231215-en
General
-
Target
044714798b4d1e6cbb71ee38376e5847
-
Size
263KB
-
MD5
044714798b4d1e6cbb71ee38376e5847
-
SHA1
3b4181f21a4a83e50d0515ea4443e3f098073c69
-
SHA256
e5beacb61c448658b15d6f7c0d7287490ef4594df6c7d0324967b5920c9140dc
-
SHA512
5461101f68c0a149d7c7a76e6b5097420ed8e67c3988829f897fbdd03ac473ecedf8c8b5d5379ac9ed06e77e36e0e4747d590c8713db2c115a7704fa60d020d0
-
SSDEEP
3072:e+vaCinRf44ZLYKX+nV6ehR8wiCKLSgu+OjV0rCS9RObYUkT7Ubb4Yr1Kro/SIJE:uQjSgUUjF8e7lM4Z5rv5DrUMI
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 044714798b4d1e6cbb71ee38376e5847
Files
-
044714798b4d1e6cbb71ee38376e5847.exe windows:1 windows x86 arch:x86
321831f361ab4157f95bd8a7ba4ef652
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
htons
ioctlsocket
inet_addr
inet_ntoa
listen
ntohs
recv
select
accept
send
socket
gethostbyaddr
gethostbyname
bind
closesocket
WSAGetLastError
WSAStartup
WSACleanup
__WSAFDIsSet
connect
getpeername
getsockname
htonl
shell32
ShellExecuteA
winmm
mciSendStringA
kernel32
ExitProcess
FindClose
FindFirstFileA
FindNextFileA
FreeLibrary
GetCommandLineA
GetCurrentProcess
GetDateFormatA
GetExitCodeProcess
GetFileAttributesA
GetFileSize
GetLastError
GetModuleFileNameA
GetModuleHandleA
CloseHandle
GetProcAddress
GetSystemDirectoryA
GetTickCount
GetTimeFormatA
GetVersionExA
GetWindowsDirectoryA
GlobalMemoryStatus
CopyFileA
LoadLibraryA
CreateDirectoryA
MoveFileA
OpenProcess
PeekNamedPipe
CreateFileA
ReadFile
RtlUnwind
SetFileAttributesA
SetFilePointer
CreateMutexA
Sleep
TerminateProcess
TerminateThread
CreatePipe
CreateProcessA
WriteFile
lstrcpyA
lstrcpynA
lstrlenA
CreateThread
DeleteFileA
DuplicateHandle
user32
GetWindowTextA
GetForegroundWindow
GetKeyState
GetAsyncKeyState
MapVirtualKeyA
ExitWindowsEx
wsprintfA
CharUpperBuffA
CharToOemA
keybd_event
advapi32
GetUserNameA
RegDeleteValueA
RegEnumKeyA
RegCreateKeyA
RegCreateKeyExA
RegCloseKey
RegOpenKeyA
RegOpenKeyExA
RegQueryInfoKeyA
RegQueryValueExA
RegSetValueExA
crtdll
__GetMainArgs
atoi
exit
fclose
fopen
fputs
fread
fwrite
malloc
mbstowcs
memcmp
memcpy
memset
raise
rand
signal
sprintf
srand
strcat
strchr
strcmp
strncpy
strstr
strtok
Sections
.avp Size: 35KB - Virtual size: 148KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.avp Size: 4KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.avp Size: 224KB - Virtual size: 224KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE