Static task
static1
Behavioral task
behavioral1
Sample
b436b6c2e83b33306dec4b44f4f40213.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b436b6c2e83b33306dec4b44f4f40213.exe
Resource
win10v2004-20240226-en
General
-
Target
b436b6c2e83b33306dec4b44f4f40213
-
Size
172KB
-
MD5
b436b6c2e83b33306dec4b44f4f40213
-
SHA1
dc475eb91b0d81bf8d5b4e1216a9b0dd04b51618
-
SHA256
7872591db15c5842429cbfce39f0103cb245fc249e34f26f91d60e6bef1094e0
-
SHA512
f79749b265bdec625f5964f054544d1c0734828b6bf8d70e50db30060ecc160d1209835ad6a2754ae00e2a5716eba6ece7600018867e11a9f598c00178ef9a91
-
SSDEEP
3072:7PvWHV+UwPpgUhfn+EKkEkVBM7fvoMlPfgI:7PvWvwg8n+EbEkVBOAMOI
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b436b6c2e83b33306dec4b44f4f40213
Files
-
b436b6c2e83b33306dec4b44f4f40213.exe windows:4 windows x86 arch:x86
a2ff39d23da055f2bad3bb7f896e77ae
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLastError
GetVersionExA
WideCharToMultiByte
FreeLibrary
TerminateProcess
WaitForSingleObject
GetModuleFileNameA
DuplicateHandle
GetCurrentProcess
OpenProcess
WriteFile
GetStartupInfoA
GetModuleHandleA
CreateFileA
LoadLibraryA
GetProcAddress
Sleep
WinExec
GetSystemDirectoryA
GetFileAttributesExA
SetFileTime
CloseHandle
CreateProcessA
user32
GetDesktopWindow
DispatchMessageA
TranslateMessage
GetMessageA
RegisterClassExA
DefWindowProcA
PostQuitMessage
SendMessageTimeoutA
RegisterWindowMessageA
GetClassNameA
PostMessageA
EnumChildWindows
GetWindowThreadProcessId
EnumWindows
ShowWindow
CreateWindowExA
advapi32
GetUserNameA
OpenSCManagerA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
CreateServiceA
DeleteService
OpenServiceA
ConvertSidToStringSidA
LookupAccountNameA
StartServiceA
CloseServiceHandle
shell32
SHGetSpecialFolderPathA
ole32
CoInitialize
CoUninitialize
oleaut32
SysFreeString
VariantClear
shlwapi
SHGetValueA
SHSetValueA
msvcrt
strchr
_stricmp
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
time
srand
fopen
fwrite
fflush
fclose
__CxxFrameHandler
strstr
_strlwr
rand
sprintf
??3@YAXPAX@Z
??2@YAPAXI@Z
_access
wcslen
atoi
dbghelp
ImageNtHeader
Sections
.text Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 116KB - Virtual size: 113KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
qdata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
odata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ndata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
mdata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
edata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
cdata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
idata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ