Static task
static1
Behavioral task
behavioral1
Sample
57a24824fa2381cf468ea8365b792a23.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
57a24824fa2381cf468ea8365b792a23.exe
Resource
win10v2004-20231222-en
General
-
Target
57a24824fa2381cf468ea8365b792a23
-
Size
74KB
-
MD5
57a24824fa2381cf468ea8365b792a23
-
SHA1
3b31a12c1ca2d7cd04275f031f744fa48a418dd9
-
SHA256
bb74b15b36132a739fc61c26d0ee0d42818ccb0427b0f81837ceb697bff083c3
-
SHA512
6fbec2551d8e4c263aaef71045bca032da4a2f57df7ad5eb926b0590494e48abe40506a9ba884851e84b686416f03d1509ee69675e38acc7f915ba54f1ac242d
-
SSDEEP
768:jP/s8Vul2EZCPHuAAGekgctvKQqZ4ClpOR+GXStpSOMKwICof1ADxokD:jfQ2EyZAGeZqCz2+eSD7fw1xok
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 57a24824fa2381cf468ea8365b792a23
Files
-
57a24824fa2381cf468ea8365b792a23.exe windows:4 windows x86 arch:x86
2bb44e1b49f85e0b0273c03baf967614
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
TerminateProcess
OpenProcess
LocalFree
MapViewOfFile
UnmapViewOfFile
GetVersionExA
Sleep
DeleteFileA
CreateMutexA
CopyFileA
CreateDirectoryA
GetWindowsDirectoryA
CreateThread
MoveFileExA
GlobalMemoryStatus
GetComputerNameA
CreateToolhelp32Snapshot
lstrcatA
GetProcessHeap
GetCurrentProcessId
GetCurrentThreadId
SetStdHandle
GetOEMCP
GetACP
GetCPInfo
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
Process32First
Module32First
Process32Next
LoadLibraryA
GetProcAddress
FreeLibrary
GetCurrentProcess
GetModuleFileNameA
GetTickCount
lstrcpyA
ReadFile
CreateFileA
WriteFile
WinExec
ExitProcess
SetFileAttributesA
FindFirstFileA
FileTimeToLocalFileTime
FileTimeToSystemTime
GetLastError
FindNextFileA
FindClose
GetDriveTypeA
CreatePipe
GetStartupInfoA
GetSystemDirectoryA
CreateProcessA
CloseHandle
HeapAlloc
MultiByteToWideChar
SetFilePointer
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
HeapSize
HeapCreate
HeapDestroy
GetEnvironmentVariableA
IsBadWritePtr
VirtualAlloc
HeapReAlloc
HeapFree
RtlUnwind
GetModuleHandleA
GetCommandLineA
GetVersion
VirtualFree
FlushFileBuffers
user32
ExitWindowsEx
GetSystemMetrics
SetThreadDesktop
OpenDesktopA
SetProcessWindowStation
OpenWindowStationA
GetThreadDesktop
GetProcessWindowStation
CloseDesktop
CloseWindowStation
wsprintfA
gdi32
CreateDCA
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
BitBlt
GetDIBits
DeleteDC
DeleteObject
advapi32
AdjustTokenPrivileges
StartServiceCtrlDispatcherA
StartServiceA
OpenSCManagerA
OpenServiceA
ChangeServiceConfigA
QueryServiceStatus
ControlService
CloseServiceHandle
RegOpenKeyExA
RegRestoreKeyA
RegisterServiceCtrlHandlerA
SetServiceStatus
GetSecurityInfo
SetEntriesInAclA
SetSecurityInfo
OpenProcessToken
LookupPrivilegeValueA
shell32
SHGetFileInfoA
ws2_32
send
WSASocketA
gethostbyname
inet_addr
shutdown
recv
closesocket
connect
socket
htons
WSAStartup
sendto
setsockopt
htonl
Sections
.text Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE