Static task
static1
Behavioral task
behavioral1
Sample
07c198365d9cca018bedb721629cd417937bab3d29e5da13d3c9f4ff63d900fa.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
07c198365d9cca018bedb721629cd417937bab3d29e5da13d3c9f4ff63d900fa.exe
Resource
win10v2004-20240226-en
General
-
Target
07c198365d9cca018bedb721629cd417937bab3d29e5da13d3c9f4ff63d900fa
-
Size
332KB
-
MD5
e4488b54f88bf894fe624a11a583ec1b
-
SHA1
ee89d5ce898d83e92c0e5b5ebcbc20c367215075
-
SHA256
07c198365d9cca018bedb721629cd417937bab3d29e5da13d3c9f4ff63d900fa
-
SHA512
42970b94a648611bc8de4f5841f6b226a5e4850191cf38eb2aaa610d8829bc5d5caa1e1277ec6a1b1cd1650079592070bd5418eb3167fd58ebdc0184d2b98771
-
SSDEEP
6144:Rd1T5qT21fa4RztZymZcKwikYb/WC099h1B0IRGQJY74GeF3o1nbxUPVuUDFD:1CGzvyflrGQJYsNF3Inb8u
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 07c198365d9cca018bedb721629cd417937bab3d29e5da13d3c9f4ff63d900fa
Files
-
07c198365d9cca018bedb721629cd417937bab3d29e5da13d3c9f4ff63d900fa.exe windows:4 windows x86 arch:x86
1c1d31f4e2b664baffd72fee41fe11b3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
orasql11
sqlcxt
kernel32
ExitProcess
VirtualAlloc
HeapDestroy
HeapCreate
HeapAlloc
LeaveCriticalSection
EnterCriticalSection
CloseHandle
CreateThread
CreateSemaphoreA
InitializeCriticalSection
CreateMutexA
GetLastError
GetModuleHandleA
ReleaseMutex
WaitForSingleObject
ExitThread
GetCurrentThreadId
GetCommandLineA
CompareStringA
RaiseException
LoadLibraryA
GetOEMCP
GetACP
GetCPInfo
FlushFileBuffers
HeapReAlloc
MulDiv
LCMapStringA
GetStringTypeW
GetStringTypeA
MultiByteToWideChar
WriteFile
VirtualFree
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
SetEndOfFile
GetStdHandle
SetHandleCount
SetStdHandle
HeapFree
WideCharToMultiByte
GetProcAddress
GetVersion
GetStartupInfoA
GetCurrentProcess
TerminateProcess
CreateFileA
GetFileType
SetFilePointer
ReadFile
GetLocalTime
GetSystemTime
GetModuleFileNameA
SetEnvironmentVariableA
GlobalAlloc
GlobalLock
lstrcpyA
lstrlenA
GlobalUnlock
GlobalFree
CompareStringW
LCMapStringW
GetTimeZoneInformation
RtlUnwind
user32
LoadStringA
wsprintfA
SendDlgItemMessageA
ReleaseDC
GetDC
GetWindow
EndDialog
CreateWindowExA
DefMDIChildProcA
DefFrameProcA
DefDlgProcA
DefWindowProcA
DialogBoxParamA
SetDlgItemTextA
SendMessageA
PostThreadMessageA
GetWindowLongA
MoveWindow
PostQuitMessage
LoadAcceleratorsA
TranslateAcceleratorA
PostMessageA
GetMessageA
TranslateMessage
DispatchMessageA
wvsprintfA
GetWindowRect
SetWindowPos
DestroyWindow
LoadIconA
LoadCursorA
RegisterClassA
ShowWindow
UpdateWindow
KillTimer
SetTimer
GetDlgItemTextA
gdi32
DeleteObject
CreateFontA
GetDeviceCaps
advapi32
RegisterEventSourceA
ReportEventA
RegCreateKeyA
RegSetValueExA
RegCloseKey
ws2_32
WSAStartup
WSAEnumProtocolsA
socket
bind
getsockname
listen
recv
send
WSAGetLastError
accept
WSAAsyncSelect
closesocket
sendto
wsock32
ord1109
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
Sections
.text Size: 272KB - Virtual size: 271KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 32KB - Virtual size: 73.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ