Static task
static1
Behavioral task
behavioral1
Sample
67d5b11dad867850c13e4e5e3a660d9c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
67d5b11dad867850c13e4e5e3a660d9c.exe
Resource
win10v2004-20231215-en
General
-
Target
67d5b11dad867850c13e4e5e3a660d9c
-
Size
15KB
-
MD5
67d5b11dad867850c13e4e5e3a660d9c
-
SHA1
e8ebafe61d8feeb1b4f0de72c090cd45528eb415
-
SHA256
8ae54765246867d1d415ef3e9131f0cf8ee9bd8625ffbdaa9fcaf756adfe8ff4
-
SHA512
34ce37cab41137d1fca597033e054e9429b4cf6c70ad8834de343f19ee3165a01bb08d218726e70e7b3ca7de70b4a5232197c42c10aebc742ca1329f4c3dbfe2
-
SSDEEP
192:VZSy3ae60naF3OaiP4Y6q9nzo0PDahlR4p+72DArvzJQhbjpBS1mbDAVlDRPRyD2:VZS4aNMVranQ+72EmdAKvMB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 67d5b11dad867850c13e4e5e3a660d9c
Files
-
67d5b11dad867850c13e4e5e3a660d9c.exe windows:4 windows x86 arch:x86
2e674214931152788611346a78373fc3
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CopyFileA
lstrcatA
GetSystemDirectoryA
GetTempFileNameA
GetTempPathA
WaitForSingleObject
CreateThread
CreateMutexA
GetVersionExA
lstrcmpiA
LoadLibraryA
lstrcpyA
DeleteFileA
Sleep
WinExec
lstrlenA
GetTickCount
CloseHandle
ReadFile
SetFilePointer
GetProcAddress
GetLastError
FreeLibrary
GetCurrentProcess
CreateFileA
user32
FindWindowA
wsprintfA
advapi32
LookupPrivilegeValueA
AdjustTokenPrivileges
RegCloseKey
RegSetValueExA
RegCreateKeyA
OpenProcessToken
msvcp60
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?rfind@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
?substr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV12@II@Z
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@PBDABV10@@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??0Init@ios_base@std@@QAE@XZ
??1Init@ios_base@std@@QAE@XZ
??0_Winit@std@@QAE@XZ
??1_Winit@std@@QAE@XZ
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??1?$basic_ios@DU?$char_traits@D@std@@@std@@UAE@XZ
??1?$basic_ifstream@DU?$char_traits@D@std@@@std@@UAE@XZ
??_D?$basic_ifstream@DU?$char_traits@D@std@@@std@@QAEXXZ
?close@?$basic_ifstream@DU?$char_traits@D@std@@@std@@QAEXXZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?getline@std@@YAAAV?$basic_istream@DU?$char_traits@D@std@@@1@AAV21@AAV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@1@@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QAEXH_N@Z
?open@?$basic_filebuf@DU?$char_traits@D@std@@@std@@QAEPAV12@PBDH@Z
??0?$basic_ifstream@DU?$char_traits@D@std@@@std@@QAE@XZ
shell32
ShellExecuteA
msvcrt
malloc
_onexit
__dllonexit
_except_handler3
fopen
fwrite
fclose
fread
atoi
strlen
memcpy
memset
_itoa
strchr
strcpy
sprintf
strcat
__CxxFrameHandler
Sections
.text Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.CRT Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls0 Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
.reloc Size: 512B - Virtual size: 60B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ