Static task
static1
Behavioral task
behavioral1
Sample
b9dc1399a6f3b9f4e2143f97c8b33c7e.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b9dc1399a6f3b9f4e2143f97c8b33c7e.exe
Resource
win10v2004-20240226-en
General
-
Target
b9dc1399a6f3b9f4e2143f97c8b33c7e
-
Size
100KB
-
MD5
b9dc1399a6f3b9f4e2143f97c8b33c7e
-
SHA1
959a332b99fb39b6e743b9c46cd509906fee23eb
-
SHA256
bdc9d1464bc134fba84ad814eab3901f7f16ec8da8647f1a01aa66e63f69cfd4
-
SHA512
602a3f186e61e1e8bdc402bd2e79fce7c12f7b8e2f595b52b432c2439cc3a587ee47ca7cdcc5f5c59b406099b26a41719d84d11062ab03752d9afe17857dda85
-
SSDEEP
3072:fg5qO5/oPeu37EgnA0oe+JQzBvD7Vly8:NO5/oPeurVgnQtvD7S
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b9dc1399a6f3b9f4e2143f97c8b33c7e
Files
-
b9dc1399a6f3b9f4e2143f97c8b33c7e.exe windows:4 windows x86 arch:x86
c7eec803b7763e5dba6eb006dd4766f6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
StrStrA
PathFileExistsA
ws2_32
setsockopt
kernel32
GetLocaleInfoA
GetTickCount
InitializeCriticalSection
WideCharToMultiByte
lstrcatA
GetACP
MultiByteToWideChar
lstrlenW
RaiseException
InterlockedExchange
GetLastError
GetThreadLocale
GetProcAddress
LoadLibraryA
GetModuleFileNameA
DeleteCriticalSection
GetVersionExA
CloseHandle
lstrcpyA
GetStdHandle
GetVersion
GetCurrentProcessId
GetVolumeInformationA
SetFileAttributesA
DeleteFileA
lstrlenA
CreateFileA
GetFileSize
ExpandEnvironmentStringsA
WriteFile
ReadFile
lstrcmpA
WaitForSingleObject
GetWindowsDirectoryA
CreateEventA
lstrcmpiA
ResetEvent
GetCurrentThreadId
GetTempPathA
TerminateThread
WinExec
EnterCriticalSection
LeaveCriticalSection
LCMapStringW
LCMapStringA
SetEndOfFile
IsBadCodePtr
IsBadReadPtr
Sleep
GetSystemInfo
VirtualProtect
GetStringTypeW
GetStringTypeA
FlushFileBuffers
GetCPInfo
GetOEMCP
SetStdHandle
HeapFree
HeapAlloc
GetSystemTimeAsFileTime
ExitProcess
GetModuleHandleA
TerminateProcess
GetCurrentProcess
GetStartupInfoA
GetCommandLineA
HeapReAlloc
RtlUnwind
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
HeapSize
TlsAlloc
SetLastError
TlsFree
TlsSetValue
TlsGetValue
SetHandleCount
GetFileType
SetFilePointer
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
VirtualQuery
SetUnhandledExceptionFilter
user32
DestroyWindow
OpenIcon
GetGuiResources
advapi32
RegSetValueExA
RegCloseKey
RegOpenKeyA
RegQueryValueExA
RegSetValueA
RegOpenKeyExA
ole32
CoInitialize
CoCreateInstance
shell32
SHGetFolderPathA
CommandLineToArgvW
SHGetSpecialFolderPathA
oleaut32
SysAllocString
SysFreeString
Sections
.text Size: 68KB - Virtual size: 66KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ