Static task
static1
Behavioral task
behavioral1
Sample
096c47707139e8c402a3d259c2439d15.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
096c47707139e8c402a3d259c2439d15.exe
Resource
win10v2004-20231215-en
General
-
Target
096c47707139e8c402a3d259c2439d15
-
Size
66KB
-
MD5
096c47707139e8c402a3d259c2439d15
-
SHA1
79418952b9a8ece9bae51e83ce56c5381c6c8eb6
-
SHA256
5a25bd23ca0373c0a72f45ac48adb3deb0b1d5bcd89bf27336716a14db92d6c0
-
SHA512
1cd9b3cc6fafc84f5739ba62c20d1b3f5f628738b542f16872ab84f4c324475912c441c756fefc82f4a1d076ed44eb697294f0ccc04819f21432ec1ab3a737ee
-
SSDEEP
1536:09+uR42v6SSnk5P66Pplpc+gz30yl0CUF9fGNTN:A1RwSX66PC4aXaETN
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 096c47707139e8c402a3d259c2439d15
Files
-
096c47707139e8c402a3d259c2439d15.exe windows:4 windows x86 arch:x86
3415e8d6211cdddf150495a5c4761b39
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
DeviceIoControl
CreateFileA
GetVolumeInformationA
lstrcpyA
GetWindowsDirectoryA
ExitProcess
TerminateProcess
SetProcessPriorityBoost
SetThreadPriority
GetCurrentThread
SetPriorityClass
GetCurrentProcess
GetEnvironmentVariableA
GetShortPathNameA
GetModuleFileNameA
IsBadWritePtr
GetComputerNameA
WriteFile
lstrlenA
GetCurrentProcessId
GetFileType
lstrcatA
GetVersionExA
GetSystemDirectoryA
Sleep
GetTempPathA
CreateProcessA
user32
wsprintfA
GetDlgItem
shell32
ShellExecuteExA
SHChangeNotify
msvcrt
sprintf
atol
_except_handler3
strncpy
rand
??3@YAXPAX@Z
__CxxFrameHandler
??2@YAPAXI@Z
strstr
srand
time
strncat
_strdup
atoi
msvcp60
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Xlen@std@@YAXXZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
shlwapi
PathGetDriveNumberA
wininet
InternetReadFile
HttpQueryInfoA
InternetOpenUrlA
InternetOpenA
InternetCloseHandle
Sections
.text Size: 63KB - Virtual size: 65KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ