Static task
static1
Behavioral task
behavioral1
Sample
110c3fc008a78c8378a195d39300c368.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
110c3fc008a78c8378a195d39300c368.exe
Resource
win10v2004-20231215-en
General
-
Target
110c3fc008a78c8378a195d39300c368
-
Size
387KB
-
MD5
110c3fc008a78c8378a195d39300c368
-
SHA1
252c4a95a1ab7b251e3101a695fdc76226cf08e7
-
SHA256
2b851667d6dd50e3105ab303836d82bdc833111719ea1db106b5b5489b2dd47b
-
SHA512
166c0cb1bd6e0422021946d5a2b37ff01d9f11dff8242cc3e6b249c2ccff0e4a3ba9e994c9827d8459fa11ce91cdac5ca7492266080edd1c6db15981343f4b6c
-
SSDEEP
6144:rtrFXoMRcTWGANnDTf7lBoqy9ZFoeTr8clVhY/bHz5CCNJ2cH:rXJRcTWGANnDPl2lZ+eke8jHz4CN0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 110c3fc008a78c8378a195d39300c368
Files
-
110c3fc008a78c8378a195d39300c368.exe windows:4 windows x86 arch:x86
4767213a501c1d23fece7d97c7f2a2d5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
SHGetFileInfoA
ExtractIconExW
SHGetFileInfo
ShellExecuteExW
SHFileOperation
gdi32
CreateEnhMetaFileW
SetMapperFlags
CreateHalftonePalette
CombineTransform
PolyDraw
ColorMatchToTarget
ExtTextOutW
RemoveFontResourceA
AbortPath
SetBitmapBits
GetCharacterPlacementW
GetMetaFileBitsEx
SetDIBits
EnumICMProfilesW
GetEnhMetaFileBits
GetPaletteEntries
GetPixel
PtVisible
comdlg32
ReplaceTextA
wininet
CreateUrlCacheEntryW
InternetCombineUrlW
InternetConnectW
SetUrlCacheEntryInfoW
GopherOpenFileA
FtpFindFirstFileA
FtpPutFileEx
FtpPutFileA
InternetCreateUrlW
FindNextUrlCacheContainerA
DeleteUrlCacheGroup
InternetCanonicalizeUrlW
FtpGetFileSize
InternetCrackUrlA
LoadUrlCacheContent
FindFirstUrlCacheEntryW
UnlockUrlCacheEntryFileA
FindNextUrlCacheEntryExA
InternetErrorDlg
FreeUrlCacheSpaceW
FtpCommandA
InternetSetOptionW
kernel32
VirtualQuery
ExitProcess
LoadLibraryA
InterlockedExchange
HeapAlloc
TransactNamedPipe
RtlUnwind
GetSystemTimeAsFileTime
GetModuleHandleA
GetCurrentProcessId
QueryPerformanceCounter
GetCurrentThreadId
GetCurrentProcess
SetPriorityClass
GetModuleFileNameA
WriteConsoleOutputCharacterW
InterlockedIncrement
InterlockedDecrement
GetSystemDirectoryW
GetProfileSectionW
GetTickCount
VirtualAlloc
GetProcAddress
TerminateProcess
OpenEventA
HeapFree
HeapReAlloc
WaitForDebugEvent
advapi32
CryptEncrypt
CryptCreateHash
RegEnumKeyExW
CreateServiceA
Sections
.text Size: 113KB - Virtual size: 113KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 263KB - Virtual size: 263KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ