Static task
static1
Behavioral task
behavioral1
Sample
79d5226d910f252eac39da1c576bfd6d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
79d5226d910f252eac39da1c576bfd6d.exe
Resource
win10v2004-20231222-en
General
-
Target
79d5226d910f252eac39da1c576bfd6d
-
Size
75KB
-
MD5
79d5226d910f252eac39da1c576bfd6d
-
SHA1
72f3b9e8c9768a1739e3e56b7f7701e0b2b67284
-
SHA256
151ddccd1920a3dea6c35ccf50a2cdf87aef90e3061a20d417b59ea9965a20cc
-
SHA512
fa013bc7817543231c692a50bb0829adf17b914f0f781b278736606d21c4e3e1ef4068bd2d18601b89a07ea84e036f069dd23ed33f81413dead8e4b3c702a6f6
-
SSDEEP
1536:NCOAJFkJVqkj2BeJaI/v4tBc97MYajNCO51g2yV8:NCP4R2Br7tOjaJCFb8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 79d5226d910f252eac39da1c576bfd6d
Files
-
79d5226d910f252eac39da1c576bfd6d.exe windows:4 windows x86 arch:x86
385a32a5e5cc52a81643cd73a80358bb
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
DeviceIoControl
CreateFileA
GetVolumeInformationA
ExitProcess
TerminateProcess
SetProcessPriorityBoost
SetThreadPriority
GetCurrentThread
SetPriorityClass
GetCurrentProcess
GetEnvironmentVariableA
GetShortPathNameA
GetModuleFileNameA
IsBadWritePtr
GetComputerNameA
WriteFile
lstrlenA
GetCommandLineA
GetTickCount
lstrcatA
lstrcpyA
GetTempPathA
GetVersionExA
Sleep
CreateProcessA
user32
wsprintfA
SendMessageA
FindWindowA
shell32
SHChangeNotify
SHGetSpecialFolderPathA
ShellExecuteExA
msvcrt
sprintf
atol
strncpy
atoi
rand
??3@YAXPAX@Z
??2@YAPAXI@Z
strstr
__CxxFrameHandler
strncat
_strdup
_except_handler3
msvcp60
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Xlen@std@@YAXXZ
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
shlwapi
PathGetDriveNumberA
wininet
InternetReadFile
HttpQueryInfoA
InternetOpenUrlA
InternetOpenA
InternetCloseHandle
Sections
.text Size: 72KB - Virtual size: 74KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ