Static task
static1
Behavioral task
behavioral1
Sample
b647c2b5622a0cea91816222d96f8331.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b647c2b5622a0cea91816222d96f8331.exe
Resource
win10v2004-20240226-en
General
-
Target
b647c2b5622a0cea91816222d96f8331
-
Size
73KB
-
MD5
b647c2b5622a0cea91816222d96f8331
-
SHA1
6250f43b6e69894f799e25aa46feb7f744aebab5
-
SHA256
a9560d600875ca6c2671b61aba7add4fb7012e03f552d55bfef14a83e501a93e
-
SHA512
89bfaf4d4a8a9accaa6ec18fe00a3f7535ee3ed6c62ec5cef1333fe529ce57de50926833a092b5dedd0dcd0bb5b794b24505e8b348179acda39742cb93805be6
-
SSDEEP
1536:hJG95zt38QFSflrATeZ81uWLsdtJGcglzZCvQZa5cC:j855YlrceZjWszyFJC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b647c2b5622a0cea91816222d96f8331
Files
-
b647c2b5622a0cea91816222d96f8331.exe windows:4 windows x86 arch:x86
607ebf69f9902c615d38b826b47551a0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
DeviceIoControl
CreateFileA
GetVolumeInformationA
ExitProcess
TerminateProcess
SetProcessPriorityBoost
SetThreadPriority
GetCurrentThread
SetPriorityClass
GetCurrentProcess
GetEnvironmentVariableA
GetShortPathNameA
GetModuleFileNameA
IsBadWritePtr
GetComputerNameA
WriteFile
lstrlenA
lstrcpynA
GetTickCount
lstrcatA
lstrcpyA
GetTempPathA
GetVersionExA
Sleep
CreateProcessA
user32
wsprintfA
SendMessageA
FindWindowA
shell32
SHChangeNotify
SHGetSpecialFolderPathA
ShellExecuteExA
msvcrt
sprintf
atol
strncpy
atoi
??3@YAXPAX@Z
??2@YAPAXI@Z
strstr
rand
__CxxFrameHandler
strncat
_strdup
_except_handler3
msvcp60
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Xlen@std@@YAXXZ
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
shlwapi
PathGetDriveNumberA
wininet
InternetReadFile
HttpQueryInfoA
InternetOpenUrlA
InternetOpenA
InternetCloseHandle
Sections
.text Size: 70KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ