Static task
static1
Behavioral task
behavioral1
Sample
test_large.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
test_large.exe
Resource
win10v2004-20231215-en
General
-
Target
test_large.exe
-
Size
3.3MB
-
MD5
f6bb217ef41610cae7da63e70f35c7ed
-
SHA1
fa001c38d8a526dc08c6a4a6fed53d1d2e3fccc0
-
SHA256
7e9db9bf79d4bafa9ae16ba6d2d7ef4f065be9b40eee62b4f03084961e8457ad
-
SHA512
3f584ee154967d86079345ea1451ab99afdd0202b406dd31d0d1ae3cfdeeda233e8181cc85c0ceb718defd033480b3ebe9faf691a4c75a56d6eefb73ef484bbf
-
SSDEEP
49152:iV1NybKv+m+4FA5utGHrQwthfpaHh/Kw+FwKQ:iuKvG4b
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource test_large.exe
Files
-
test_large.exe.exe windows:4 windows x86 arch:x86
58af1860cae549bad3e79e71847e451f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42u
ord2613
ord1131
ord5261
ord4370
ord4847
ord4992
ord4704
ord6048
ord4073
ord1767
ord4401
ord5237
ord2377
ord5157
ord6370
ord4347
ord5276
ord3793
ord4831
ord4435
ord2640
ord2047
ord6372
ord3744
ord2506
ord1720
ord5257
ord2438
ord2116
ord5273
ord4621
ord4419
ord3592
ord324
ord4229
ord1143
ord1165
ord4282
ord6193
ord6374
ord800
ord4155
ord540
ord2858
ord2371
ord755
ord470
ord823
ord641
ord1569
ord815
ord825
ord561
ord3733
ord4418
ord4616
ord4075
ord3074
ord3820
ord3826
ord3825
ord2971
ord3076
ord2980
ord3257
ord3131
ord4459
ord3254
ord3142
ord2977
ord5710
ord5285
ord5303
ord4692
ord4074
ord2717
ord5298
ord5296
ord3341
ord2388
ord5193
ord1089
ord3917
ord5727
ord2504
ord2546
ord4480
ord6371
ord4269
ord5059
ord4667
msvcrt
_controlfp
_onexit
__dllonexit
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__wgetmainargs
_wcmdln
exit
_XcptFilter
_exit
__CxxFrameHandler
srand
time
wcslen
strncmp
rand
sprintf
strncpy
wcscat
kernel32
CreateToolhelp32Snapshot
Process32FirstW
OpenProcess
Process32NextW
CloseHandle
CreateThread
WaitForSingleObject
DeleteFileW
Sleep
GetProcAddress
LoadLibraryA
FreeLibrary
TerminateProcess
GetComputerNameA
GetVersionExW
GetTickCount
GetSystemInfo
GetModuleHandleW
GetCurrentProcess
GetLastError
GetCurrentThread
CreateFileW
GetTempPathW
GetFileSize
CreatePipe
ReadFile
CreateProcessW
GetSystemDirectoryW
GetStartupInfoW
WriteFile
GetSystemTime
GetOEMCP
WideCharToMultiByte
user32
AppendMenuW
SendMessageW
GetSystemMenu
LoadIconW
DrawIcon
IsIconic
GetClientRect
GetSystemMetrics
wsprintfW
PostMessageW
EnableWindow
advapi32
RegCloseKey
RegQueryValueExA
OpenThreadToken
OpenProcessToken
GetTokenInformation
LookupAccountSidA
RegOpenKeyExA
shell32
SHGetSpecialFolderPathW
ShellExecuteW
ws2_32
gethostbyname
inet_ntoa
inet_addr
WSAStartup
gethostname
psapi
GetModuleFileNameExW
EnumProcessModules
GetProcessImageFileNameW
Sections
.text Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ