Static task
static1
Behavioral task
behavioral1
Sample
422c0a39d95cd1796654960817966468.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
422c0a39d95cd1796654960817966468.exe
Resource
win10v2004-20231215-en
General
-
Target
422c0a39d95cd1796654960817966468
-
Size
42KB
-
MD5
422c0a39d95cd1796654960817966468
-
SHA1
2f99371ec3428ef942c4f4633f6644315dd6594a
-
SHA256
40ba638e53129c79fd2b8fc4565ad2a6d7222bdd82f0be3de766a265df0e2e65
-
SHA512
96363611b547c690dbfb77b4098fe01a16bfbfcb7b3a9b168daf777ff08d530e1dbd90c81ae9f3829adfaf57542677e6537d53b7f5a515ebebc88d69b3b26457
-
SSDEEP
768:9TuXIEyrhGU4ZfnGfkXeXeXeXVXIEAXIEIXIuXIKX7XoXIEbXIm:9DEGoUY/GKEVEdvmEcm
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 422c0a39d95cd1796654960817966468
Files
-
422c0a39d95cd1796654960817966468.exe windows:4 windows x86 arch:x86
1e36d3b8ba9ab0423be77597ea15d665
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetProcessHeap
SetErrorMode
GetCommandLineA
CreateMutexA
GetLastError
HeapFree
CreateThread
HeapAlloc
ExitProcess
WriteFile
CloseHandle
CreateFileA
lstrlenA
SetFileTime
SetFilePointer
CopyFileA
GetFileTime
lstrcatA
Sleep
FreeLibrary
DeleteFileA
MoveFileExA
GetWindowsDirectoryA
GetModuleFileNameA
LoadLibraryA
GetProcAddress
FindFirstFileA
FindNextFileA
FindClose
ReadFile
GetTickCount
lstrcpyA
GetComputerNameA
wininet
InternetReadFile
InternetCloseHandle
InternetOpenUrlA
InternetOpenA
shell32
ShellExecuteA
ws2_32
setsockopt
htons
send
inet_ntoa
ntohl
closesocket
recv
connect
htonl
bind
socket
WSAStartup
user32
wsprintfA
advapi32
ControlService
ChangeServiceConfigA
CloseServiceHandle
OpenServiceA
OpenSCManagerA
RegCreateKeyExA
RegSetValueExA
RegQueryValueExA
RegCloseKey
shlwapi
SHSetValueA
Sections
.text Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 36B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE