Static task
static1
Behavioral task
behavioral1
Sample
c40929f74cd2f896d458aa4518a61c5c5b6eea6586f5f7003ba6cba6cd7ed81e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
c40929f74cd2f896d458aa4518a61c5c5b6eea6586f5f7003ba6cba6cd7ed81e.exe
Resource
win10-20231215-en
General
-
Target
c40929f74cd2f896d458aa4518a61c5c5b6eea6586f5f7003ba6cba6cd7ed81e
-
Size
175KB
-
MD5
fae96e7e907d614d8bd51d1e13a06123
-
SHA1
f6dabe0f35f00776f0e72d8bd968fb11115a5755
-
SHA256
c40929f74cd2f896d458aa4518a61c5c5b6eea6586f5f7003ba6cba6cd7ed81e
-
SHA512
4130c83fd58819c61d4a59e4202b5c432d3dd4bc3648ea8eb8479c9569482923fbd2ae8b69e87f3c9ae4d539e6efcd4ce88c4238d6ad6e52e25cb3fdd9a5fbdd
-
SSDEEP
3072:gwkhkI/KL4jFdVlGFoetvVCTYKcuglwVMVFga+0MPsh//6alZCm:8hX/KLUFD8FtvYMrxl07shZZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c40929f74cd2f896d458aa4518a61c5c5b6eea6586f5f7003ba6cba6cd7ed81e
Files
-
c40929f74cd2f896d458aa4518a61c5c5b6eea6586f5f7003ba6cba6cd7ed81e.exe windows:5 windows x86 arch:x86
277433aa14e04801120e6c70fc8a7215
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetComputerNameW
BackupSeek
GetModuleHandleW
GetProcessHeap
GetConsoleAliasesLengthA
GetWindowsDirectoryA
GetVolumePathNameW
GlobalFindAtomA
LoadLibraryW
GetConsoleMode
WriteConsoleW
CreateFileW
InterlockedExchange
GetLastError
SetLastError
GetProcAddress
VirtualAlloc
BeginUpdateResourceW
SetComputerNameA
OpenMutexA
LocalAlloc
InterlockedIncrement
CreateHardLinkW
AddAtomW
RemoveDirectoryW
BeginUpdateResourceA
GetCommMask
OpenJobObjectW
FindFirstVolumeMountPointA
FindFirstChangeNotificationA
OpenFileMappingW
GetStringTypeW
VirtualProtect
_lopen
GetVersionExA
GetWindowsDirectoryW
EnumResourceLanguagesW
SuspendThread
lstrcpyA
DebugActiveProcess
LoadResource
DnsHostnameToComputerNameA
InterlockedDecrement
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetStartupInfoW
RaiseException
RtlUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
HeapFree
TerminateProcess
GetCurrentProcess
IsDebuggerPresent
HeapAlloc
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapSize
HeapReAlloc
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetLocaleInfoA
GetStringTypeA
MultiByteToWideChar
LoadLibraryA
InitializeCriticalSectionAndSpinCount
LCMapStringA
WideCharToMultiByte
LCMapStringW
user32
CharLowerBuffA
gdi32
GetDeviceGammaRamp
advapi32
BackupEventLogA
Sections
.text Size: 134KB - Virtual size: 133KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 4.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ