Static task
static1
Behavioral task
behavioral1
Sample
b9d87088e6eaaa624d9a14c3728890fd.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
b9d87088e6eaaa624d9a14c3728890fd.exe
Resource
win10v2004-20240226-en
General
-
Target
b9d87088e6eaaa624d9a14c3728890fd
-
Size
21KB
-
MD5
b9d87088e6eaaa624d9a14c3728890fd
-
SHA1
5b8e6ad8789009449c161ccae6f90a737a8797b8
-
SHA256
7a6344f8f8a1af5073077731d503f814ff5d0a6105596f4bd9fdd084a54af84c
-
SHA512
bd56af2b320b9c67bce6167b3aab0a8f4c62f7c13cda1c813c6c9c67bcaeb1a4d4211ab11f33bcd51fc1cfa56d256bbebc2a72cc398a2b20da28d6276d286db2
-
SSDEEP
384:dFNnNVbgSbD6Kg8+UAq4OwSRNFdv7QuhQ0KTM/0V61Elbk1/A8Vhu45ZQQxWafqh:dfnNVbgSbVg8+UAq4OwSRNFdv7QuhQ0a
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b9d87088e6eaaa624d9a14c3728890fd
Files
-
b9d87088e6eaaa624d9a14c3728890fd.exe windows:4 windows x86 arch:x86
0468237b789a05eac4fc4ca097401a9b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
??3@YAXPAX@Z
??2@YAPAXI@Z
memcpy
strcpy
exit
toupper
_ftol
strlen
ceil
fopen
fprintf
fclose
_endthread
strcmp
strncpy
_beginthread
atoi
??1type_info@@UAE@XZ
_CxxThrowException
strstr
srand
rand
_snprintf
memset
_vsnprintf
strncat
kernel32
LocalFree
GetSystemTime
CreateFileA
GetFileSize
WriteFile
SetFilePointer
ReadFile
FreeLibrary
LoadLibraryA
GetProcAddress
OpenProcess
VirtualAllocEx
WriteProcessMemory
CreateRemoteThread
CloseHandle
WinExec
GetComputerNameA
GetLocaleInfoA
GetTickCount
Sleep
TerminateThread
ReleaseMutex
WaitForSingleObject
CreateMutexA
GetCurrentProcessId
ExitProcess
GetLastError
SetFileAttributesA
CopyFileA
GetSystemDirectoryA
GetModuleFileNameA
GetModuleHandleA
SetErrorMode
GetTempPathA
QueryPerformanceFrequency
QueryPerformanceCounter
GetVersionExA
GetFileAttributesA
SetProcessPriorityBoost
SetThreadPriority
GetCurrentThread
SetPriorityClass
GetCurrentProcess
MoveFileExA
GetEnvironmentVariableA
GetShortPathNameA
lstrlenA
GlobalUnlock
GlobalLock
GlobalAlloc
DeleteFileA
user32
OpenClipboard
VkKeyScanA
FindWindowA
SetFocus
SetForegroundWindow
keybd_event
CloseClipboard
SetClipboardData
ShowWindow
EmptyClipboard
GetWindowThreadProcessId
BlockInput
ws2_32
send
closesocket
connect
htons
inet_addr
gethostbyname
WSAStartup
socket
recv
WSACleanup
wininet
InternetOpenA
InternetOpenUrlA
InternetReadFile
urlmon
URLDownloadToFileA
shell32
SHChangeNotify
ShellExecuteA
ShellExecuteExA
advapi32
RegDeleteValueA
RegSetValueExA
RegCreateKeyExA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegCloseKey
ntdll
ZwSystemDebugControl
NtQuerySystemInformation
oleaut32
VariantInit
SysAllocString
VariantClear
ole32
CoUninitialize
CoCreateInstance
CoInitialize
Sections
.text Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE