Static task
static1
Behavioral task
behavioral1
Sample
418ea930b809addee16b882076221821.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
418ea930b809addee16b882076221821.exe
Resource
win10v2004-20231215-en
Errors
General
-
Target
418ea930b809addee16b882076221821
-
Size
83KB
-
MD5
418ea930b809addee16b882076221821
-
SHA1
2ef14c923b16dd823d62a872003f0adb49a29e81
-
SHA256
3a0447db20b3e5182f7fbc1dcd022019baf2d709700ee6b282d46ad098004886
-
SHA512
302840567868565c7d841b486b9b803c5fd6e6f35cfd0812f37a5291ebfa24cb1e594f2c41ee14b12defbc0ce3161cba27838f54a3aa84a0a47ee71b999d48ed
-
SSDEEP
1536:hXIx+jMR8/Pl3KS/m/MzjM3/lPpku+HLatFnToIf34Imnu1kzmu1kC:hXIxUMK/Pl3LSJttTBf34Imnu1kKu1kC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 418ea930b809addee16b882076221821
Files
-
418ea930b809addee16b882076221821.exe windows:4 windows x86 arch:x86
3bf27b83e0c98731800c31d3281c474f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleFileNameA
FreeLibrary
GetProcAddress
LoadLibraryA
Process32Next
Module32First
Process32First
CreateToolhelp32Snapshot
TerminateProcess
OpenProcess
ExitProcess
CopyFileA
DeleteFileA
CreateThread
lstrcmpiA
WaitForSingleObject
MoveFileA
GetFileSize
CreateFileA
WriteFile
GetLogicalDriveStringsA
GetShortPathNameA
GetVersionExA
GetComputerNameA
GetTickCount
HeapAlloc
GetProcessHeap
GetCurrentProcessId
GetModuleHandleA
VirtualAlloc
VirtualQueryEx
ReadProcessMemory
GetThreadContext
SetThreadContext
WriteProcessMemory
VirtualProtectEx
VirtualFree
GetCurrentThreadId
GetEnvironmentVariableA
GlobalAlloc
LoadLibraryExA
GlobalFree
DeviceIoControl
lstrcpyA
lstrcatA
GetCurrentProcess
SetPriorityClass
GetCurrentThread
SetThreadPriority
ResumeThread
SetFileAttributesA
FindFirstFileA
FileTimeToLocalFileTime
FileTimeToSystemTime
GetLastError
ReadFile
FindNextFileA
FindClose
GetDriveTypeA
CreatePipe
GetStartupInfoA
GetSystemDirectoryA
CreateProcessA
CloseHandle
Sleep
GlobalMemoryStatus
user32
wsprintfA
MessageBoxA
GetSystemMetrics
SetThreadDesktop
OpenDesktopA
SetProcessWindowStation
OpenWindowStationA
GetThreadDesktop
CloseWindowStation
CloseDesktop
GetProcessWindowStation
GetDesktopWindow
SetCursorPos
keybd_event
ExitWindowsEx
mouse_event
gdi32
GetDIBits
BitBlt
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
CreateDCA
DeleteDC
DeleteObject
advapi32
AdjustTokenPrivileges
DeleteService
OpenSCManagerA
CreateServiceA
OpenServiceA
CloseServiceHandle
StartServiceA
RegisterServiceCtrlHandlerA
SetServiceStatus
LookupPrivilegeValueA
OpenProcessToken
StartServiceCtrlDispatcherA
ControlService
shell32
ShellExecuteA
SHGetFileInfoA
msvcrt
_acmdln
puts
printf
_strlwr
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
free
sprintf
strncpy
??2@YAPAXI@Z
__CxxFrameHandler
atoi
strcspn
strstr
??3@YAXPAX@Z
_ftol
fclose
fprintf
fopen
rand
memmove
malloc
__dllonexit
_onexit
_exit
_XcptFilter
exit
ws2_32
WSAStartup
setsockopt
sendto
htonl
WSASocketA
htons
socket
closesocket
recv
shutdown
inet_addr
gethostbyname
send
connect
Sections
.text Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
sasa Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Xmini9 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE