Static task
static1
Behavioral task
behavioral1
Sample
b53d7fd2bfc1720ae4435d66802ea0e3.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
b53d7fd2bfc1720ae4435d66802ea0e3.exe
Resource
win10v2004-20240226-en
General
-
Target
b53d7fd2bfc1720ae4435d66802ea0e3
-
Size
104KB
-
MD5
b53d7fd2bfc1720ae4435d66802ea0e3
-
SHA1
a6a2a765666e8759fa8fe4bb7d35377d3e8b1a76
-
SHA256
594bd47734e5f1a553ca25ab6cffb4379c62555fcc7fcf2fa11e6145465a3ae1
-
SHA512
6e83d13958ce6b4cd85aaf05d384f6fa959188f4ae832ffc300a0d1e968f2747ec75ebc10a2d3396c43a97375fe49b12ddfc85c4cbbadf4dfc699b43f483dd3c
-
SSDEEP
1536:KOnNVbzqeOnNVbzqrzTK6pKRrrL9MRL2AXh0dM+:DnNVbzqHnNVbzqrzTKKKBP9MRL2AX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b53d7fd2bfc1720ae4435d66802ea0e3
Files
-
b53d7fd2bfc1720ae4435d66802ea0e3.exe windows:4 windows x86 arch:x86
0468237b789a05eac4fc4ca097401a9b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
??3@YAXPAX@Z
??2@YAPAXI@Z
memcpy
strcpy
exit
toupper
_ftol
strlen
ceil
fopen
fprintf
fclose
_endthread
strcmp
strncpy
_beginthread
atoi
??1type_info@@UAE@XZ
_CxxThrowException
strstr
srand
rand
_snprintf
memset
_vsnprintf
strncat
kernel32
LocalFree
GetSystemTime
CreateFileA
GetFileSize
WriteFile
SetFilePointer
ReadFile
FreeLibrary
LoadLibraryA
GetProcAddress
OpenProcess
VirtualAllocEx
WriteProcessMemory
CreateRemoteThread
CloseHandle
WinExec
GetComputerNameA
GetLocaleInfoA
GetTickCount
Sleep
TerminateThread
ReleaseMutex
WaitForSingleObject
CreateMutexA
GetCurrentProcessId
ExitProcess
GetLastError
SetFileAttributesA
CopyFileA
GetSystemDirectoryA
GetModuleFileNameA
GetModuleHandleA
SetErrorMode
GetTempPathA
QueryPerformanceFrequency
QueryPerformanceCounter
GetVersionExA
GetFileAttributesA
SetProcessPriorityBoost
SetThreadPriority
GetCurrentThread
SetPriorityClass
GetCurrentProcess
MoveFileExA
GetEnvironmentVariableA
GetShortPathNameA
lstrlenA
GlobalUnlock
GlobalLock
GlobalAlloc
DeleteFileA
user32
OpenClipboard
VkKeyScanA
FindWindowA
SetFocus
SetForegroundWindow
keybd_event
CloseClipboard
SetClipboardData
ShowWindow
EmptyClipboard
GetWindowThreadProcessId
BlockInput
ws2_32
send
closesocket
connect
htons
inet_addr
gethostbyname
WSAStartup
socket
recv
WSACleanup
wininet
InternetOpenA
InternetOpenUrlA
InternetReadFile
urlmon
URLDownloadToFileA
shell32
SHChangeNotify
ShellExecuteA
ShellExecuteExA
advapi32
RegDeleteValueA
RegSetValueExA
RegCreateKeyExA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegCloseKey
ntdll
ZwSystemDebugControl
NtQuerySystemInformation
oleaut32
VariantInit
SysAllocString
VariantClear
ole32
CoUninitialize
CoCreateInstance
CoInitialize
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE