Static task
static1
Behavioral task
behavioral1
Sample
1a2b9b269891d80664e558071e266c19.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1a2b9b269891d80664e558071e266c19.exe
Resource
win10v2004-20231215-en
General
-
Target
1a2b9b269891d80664e558071e266c19
-
Size
288KB
-
MD5
1a2b9b269891d80664e558071e266c19
-
SHA1
0710c05e1f9beeda613615a9de38fee51430ba3a
-
SHA256
c2e9526367118aa79cbe0fb4b0a3381d26faa2b631f59925e34e671539048f94
-
SHA512
65c184f3fa5f91bc6023fb4c9fed38cc5121eb926b6666fa5cd597c71b8994b07603ec72395a42b08d9e2de3ec95a6472a993988c6208213218d86f5b6d07908
-
SSDEEP
6144:tO8D94Z5TBvvuHzrS2sh7d6yL2FhkCpFPa24SQrXRWWFZKA:tO8h4DThvuTul6mwFP5PQrX4WGA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1a2b9b269891d80664e558071e266c19
Files
-
1a2b9b269891d80664e558071e266c19.exe windows:4 windows x86 arch:x86
bae832125a33a20611254bbb7c882ebd
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42
ord2763
ord6662
ord533
ord5194
ord3811
ord3337
ord6407
ord1997
ord798
ord5710
ord825
ord939
ord4129
ord941
ord5856
ord540
ord5683
ord4277
ord4278
ord858
ord6874
ord860
ord2818
ord535
ord536
ord2915
ord5572
ord354
ord5186
ord665
ord5773
ord5442
ord1979
ord537
ord4202
ord2764
ord800
ord823
msvcrt
_onexit
__dllonexit
free
_stricmp
_strnicmp
_exit
_XcptFilter
exit
_acmdln
printf
time
srand
rand
_vsnprintf
_except_handler3
wcslen
_wcsicmp
_mbscmp
sprintf
getenv
__CxxFrameHandler
strstr
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
malloc
_controlfp
_strcmpi
kernel32
CreateDirectoryA
FindFirstFileA
FindClose
GetSystemDirectoryA
CreateFileA
GetFileSize
GetModuleFileNameA
FindResourceA
CreateProcessA
LockResource
SizeofResource
ExitProcess
CreateToolhelp32Snapshot
Process32First
Process32Next
GetCurrentProcessId
CloseHandle
GetModuleHandleA
GetStartupInfoA
CopyFileA
WriteFile
MultiByteToWideChar
GetCurrentProcess
UnmapViewOfFile
ReadProcessMemory
MapViewOfFile
CreateFileMappingA
WriteProcessMemory
VirtualProtectEx
VirtualQueryEx
OpenProcess
HeapFree
HeapAlloc
GetProcessHeap
GetLastError
OutputDebugStringA
CreateRemoteThread
LoadResource
ReadFile
GetLocalTime
SetLocalTime
GetVersionExA
IsBadReadPtr
LocalFree
GetFileInformationByHandle
CreatePipe
GetStdHandle
Sleep
GetVersion
lstrcatA
lstrlenA
VirtualAllocEx
GetProcAddress
user32
MessageBoxA
advapi32
AdjustTokenPrivileges
OpenProcessToken
DeregisterEventSource
ReportEventA
RegisterEventSourceA
CloseServiceHandle
StartServiceA
RegCloseKey
RegSetValueExA
RegOpenKeyA
CreateServiceA
OpenSCManagerA
RegEnumValueA
RegOpenKeyExA
SetSecurityInfo
SetEntriesInAclA
GetUserNameA
GetSecurityInfo
LookupPrivilegeValueA
shell32
ShellExecuteA
msvcp60
??6std@@YAAAV?$basic_ostream@DU?$char_traits@D@std@@@0@AAV10@PBD@Z
?cin@std@@3V?$basic_istream@DU?$char_traits@D@std@@@1@A
?get@?$basic_istream@DU?$char_traits@D@std@@@std@@QAEAAV12@PADHD@Z
??1_Winit@std@@QAE@XZ
??0_Winit@std@@QAE@XZ
??1Init@ios_base@std@@QAE@XZ
??0Init@ios_base@std@@QAE@XZ
?cerr@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A
?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A
Sections
.text Size: 56KB - Virtual size: 54KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 204KB - Virtual size: 201KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ