Static task
static1
Behavioral task
behavioral1
Sample
0867d667751dc60ef86bd0de42a50803.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0867d667751dc60ef86bd0de42a50803.exe
Resource
win10v2004-20231215-en
General
-
Target
0867d667751dc60ef86bd0de42a50803
-
Size
135KB
-
MD5
0867d667751dc60ef86bd0de42a50803
-
SHA1
2ee0cabf4ba9adfeafcc4755a52dac98cd0f9c42
-
SHA256
496d8baf959f1b5c75b4bbfc4be88e67812c2a4eec75bfdc73cafc6de091fa16
-
SHA512
c5dfe9ba6af9ad983d56114d47c8802a51a1692f51769bc3155fce37ad1015c6dfa2679ce62ffd3b854c8f9d01090f3fe5a7bc78751587622103051c116690f6
-
SSDEEP
3072:ObkscE/o8LrbCPWcFEN00YAtzq9+YQwthE7n:YiE/dC0NSSy0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0867d667751dc60ef86bd0de42a50803
Files
-
0867d667751dc60ef86bd0de42a50803.exe windows:5 windows x86 arch:x86
3800b430de4dd28d3e6457545380ada1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
wsock32
recvfrom
shutdown
connect
getsockname
WSACancelAsyncRequest
GetAddressByNameW
getpeername
dn_expand
WSAAsyncSelect
select
SetServiceW
setsockopt
GetNameByTypeA
GetNameByTypeW
WSAAsyncGetProtoByNumber
getprotobynumber
WSASetBlockingHook
socket
wintrust
SoftpubCheckCert
CryptCATCDFEnumAttributesWithCDFTag
CryptSIPGetRegWorkingFlags
WVTAsn1SpcSpAgencyInfoDecode
MsCatFreeHashTag
HTTPSCertificateTrust
CryptCATGetCatAttrInfo
SoftpubDefCertInit
CryptCATAdminEnumCatalogFromHash
WTHelperGetFileHash
OpenPersonalTrustDBDialogEx
WVTAsn1SpcFinancialCriteriaInfoDecode
CryptCATGetMemberInfo
SoftpubDllRegisterServer
mssip32DllUnregisterServer
CryptCATStoreFromHandle
WVTAsn1SpcIndirectDataContentEncode
WTHelperOpenKnownStores
CryptCATAdminResolveCatalogPath
CryptCATCDFEnumMembersByCDFTagEx
CryptSIPRemoveSignedDataMsg
SoftpubAuthenticode
TrustDecode
shlwapi
PathFindSuffixArrayW
PathUnExpandEnvStringsA
SHRegQueryInfoUSKeyW
StrToIntExW
PathIsNetworkPathW
GetMenuPosFromID
PathStripToRootW
StrStrA
PathMatchSpecW
UrlIsNoHistoryA
SHRegDeleteEmptyUSKeyW
SHDeleteEmptyKeyW
PathIsFileSpecW
StrNCatW
UrlGetPartW
PathCompactPathExW
PathGetArgsW
AssocQueryKeyA
AssocQueryStringW
StrChrIW
SHRegCreateUSKeyA
PathRemoveBackslashA
cryptdll
CDLocateCheckSum
CDLocateCSystem
CDRegisterCSystem
MD5Final
CDLocateRng
CDBuildVect
CDFindCommonCSystemWithKey
MD5Init
CDRegisterCheckSum
CDRegisterRng
CDGenerateRandomBits
CDBuildIntegrityVect
MD5Update
CDFindCommonCSystem
crtdll
isleadbyte
_mbcjistojms
_spawnv
_strdec
_fputwchar
_getdcwd
vfprintf
_strnset
_tzname
vfwprintf
_wcsupr
_ismbcdigit
_CItanh
??3@YAXPAX@Z
localeconv
_getche
_dup
_loaddll
bsearch
_ecvt
frexp
kernel32
SetSystemTimeAdjustment
ExitProcess
DeleteTimerQueueTimer
GetProcessIoCounters
GlobalHandle
GetTimeZoneInformation
LoadResource
RegisterWowBaseHandlers
GetGeoInfoW
IsDebuggerPresent
GetConsoleAliasExesLengthA
GetLocaleInfoW
GetProcessTimes
RemoveVectoredExceptionHandler
ClearCommError
FindNextVolumeMountPointW
WriteProfileStringW
GetPrivateProfileIntW
BaseCleanupAppcompatCacheSupport
LZCloseFile
VirtualAlloc
GlobalFindAtomA
LoadLibraryA
Sections
.text Size: 51KB - Virtual size: 50KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 77KB - Virtual size: 236KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 376B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ