Static task
static1
Behavioral task
behavioral1
Sample
81c819ec059c47fa40ed64868b36ebb9080568415c10734aa428d21353d3e01f.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
81c819ec059c47fa40ed64868b36ebb9080568415c10734aa428d21353d3e01f.exe
Resource
win10v2004-20240226-en
General
-
Target
81c819ec059c47fa40ed64868b36ebb9080568415c10734aa428d21353d3e01f
-
Size
57KB
-
MD5
51c078e14772303ea6136e4b445537ea
-
SHA1
b5d4576c0a2c7e1c2b0343f9c399f05d30613f18
-
SHA256
81c819ec059c47fa40ed64868b36ebb9080568415c10734aa428d21353d3e01f
-
SHA512
0c4f2263411955c9268c29a2cb5ca4911a552ef4ca109e25f6eef6104ac333264d6a112140cea793adb172a253c8f4b319ee6289ef8c5b7708418553ab3c2776
-
SSDEEP
768:ilHbT5WE3UuWpZ3g3woHce6a8AXUdJRGUxEweQkr8N8GDofDZNDTE/:5u4+3CegAkdJROXneUPe
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 81c819ec059c47fa40ed64868b36ebb9080568415c10734aa428d21353d3e01f
Files
-
81c819ec059c47fa40ed64868b36ebb9080568415c10734aa428d21353d3e01f.exe windows:4 windows x86 arch:x86
913be5a3c5f8243c0fd0abaf076dd985
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
CloseServiceHandle
EnumServicesStatusA
GetUserNameA
OpenSCManagerA
RegCloseKey
RegOpenKeyExA
kernel32
CreateMutexA
CreateThread
DeleteCriticalSection
EnterCriticalSection
ExitProcess
FindClose
FindFirstFileA
FindNextFileA
FreeLibrary
GetCommandLineA
GetComputerNameA
GetLastError
GetLocaleInfoA
GetModuleHandleA
GetProcAddress
GetUserDefaultUILanguage
GetVolumeInformationA
GlobalAlloc
GlobalLock
GlobalMemoryStatusEx
GlobalUnlock
InitializeCriticalSection
InterlockedExchange
IsDBCSLeadByteEx
LeaveCriticalSection
LoadLibraryA
MultiByteToWideChar
ReleaseMutex
SetUnhandledExceptionFilter
Sleep
TlsGetValue
VirtualProtect
VirtualQuery
WaitForSingleObject
WideCharToMultiByte
msvcrt
_strdup
_stricoll
__getmainargs
__mb_cur_max
__p__environ
__p__fmode
__set_app_type
_cexit
_errno
_fpreset
_fullpath
_iob
_isctype
_onexit
_pctype
_setmode
abort
atexit
atoi
calloc
fputc
free
fwrite
getenv
localeconv
malloc
mbstowcs
memcpy
printf
realloc
setlocale
signal
sprintf
strchr
strcoll
strcpy
strlen
strstr
tolower
vfprintf
wcslen
wcstombs
user32
CloseClipboard
EmptyClipboard
FindWindowA
GetForegroundWindow
GetWindowTextA
OpenClipboard
SendMessageA
SetClipboardData
SetForegroundWindow
keybd_event
wininet
InternetCloseHandle
InternetOpenA
InternetOpenUrlA
InternetReadFile
Sections
.text Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 52B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.eh_fram Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 2KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE