Static task
static1
Behavioral task
behavioral1
Sample
878ea7a590a5ab62159b924a40224c73.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
878ea7a590a5ab62159b924a40224c73.exe
Resource
win10v2004-20231215-en
General
-
Target
878ea7a590a5ab62159b924a40224c73
-
Size
81KB
-
MD5
878ea7a590a5ab62159b924a40224c73
-
SHA1
c69b5dd411faebd57f00ef1093f4c2d0602009a2
-
SHA256
4e5477e09a09a5b6758d4404c95fd91d378a11357ac010f713146fec3236590a
-
SHA512
f17531d77d345e2d94be50236f334acd2f32210e325ccd0d29ad34e5e4ac6ac08fed9943d867584825774c66f6647c3b4045be4b17970de28fdae32f7e2f6fbf
-
SSDEEP
1536:0SL9vuFIzSSkATsntf6oa0nHhpCezdEPAnns4:0SLBcFSkATsZ6CjCOEPAnns4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 878ea7a590a5ab62159b924a40224c73
Files
-
878ea7a590a5ab62159b924a40224c73.exe windows:4 windows x86 arch:x86
77b9652677dac8cf2ff49b0058142373
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
psapi
EnumProcessModules
EnumProcesses
GetModuleBaseNameA
shell32
ShellExecuteA
wsock32
WSACleanup
WSAGetLastError
WSAStartup
closesocket
connect
gethostbyaddr
gethostbyname
gethostname
htons
inet_addr
recv
select
send
socket
advapi32
GetUserNameA
RegCloseKey
RegCreateKeyA
RegDeleteValueA
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
kernel32
AddAtomA
CloseHandle
CreateFileA
CreateMutexA
CreateSemaphoreA
CreateThread
CreateToolhelp32Snapshot
DeleteFileA
ExitProcess
ExitThread
FindAtomA
GetAtomNameA
GetCommandLineA
GetCurrentThread
GetDiskFreeSpaceA
GetDriveTypeA
GetFileAttributesA
GetLastError
GetLogicalDriveStringsA
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetStartupInfoA
GetSystemInfo
GetThreadPriority
GetTickCount
GetVersionExA
GetVolumeInformationA
InterlockedDecrement
InterlockedIncrement
OpenProcess
Process32First
Process32Next
ReleaseSemaphore
SetConsoleCtrlHandler
SetFileAttributesA
SetLastError
SetThreadPriority
SetUnhandledExceptionFilter
Sleep
TerminateProcess
TerminateThread
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
WaitForSingleObject
WriteFile
msvcrt
_getcwd
_itoa
_stat
__getmainargs
__p__environ
__p__fmode
__set_app_type
_assert
_cexit
_errno
_findclose
_findfirst
_findnext
_fullpath
_iob
_onexit
_setmode
abort
atexit
atoi
fclose
fflush
fopen
fprintf
fread
free
fwrite
getenv
malloc
memset
printf
puts
rand
signal
sprintf
srand
strcat
strcmp
strcpy
strlen
strstr
strtok
tolower
user32
EnumChildWindows
EnumWindows
GetAsyncKeyState
GetClassNameA
GetCursorPos
GetDesktopWindow
GetForegroundWindow
GetKeyState
GetSystemMetrics
GetWindowLongA
GetWindowRect
GetWindowTextA
GetWindowThreadProcessId
PostMessageA
SendMessageA
SetCursorPos
mouse_event
Sections
.text Size: 57KB - Virtual size: 57KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 54KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE