Static task
static1
Behavioral task
behavioral1
Sample
ba3dee926d0876605d69e66c0efed5f1.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ba3dee926d0876605d69e66c0efed5f1.exe
Resource
win10v2004-20240226-en
General
-
Target
ba3dee926d0876605d69e66c0efed5f1
-
Size
24KB
-
MD5
ba3dee926d0876605d69e66c0efed5f1
-
SHA1
df5a44a498d8109a7d16e99567e5aa721ce76f4f
-
SHA256
9f964046657645d7fe595d070734c75ff2ccfe4cf966d3a2b97ad3052d043389
-
SHA512
42459064b36a95a1484b9378827d0af14abc0f59d16bc4b6a115ab6897d1e11335a07e4a7245c2cb9764e1fabeecfa7269b681d81b7c1e7ef544b2a24732bcb9
-
SSDEEP
192:0r/w0qLrKYlexbReAktTO0hGErHsP1oyk3TaIKQ9Z1:8/w0qLuYUxbReLrS1YV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ba3dee926d0876605d69e66c0efed5f1
Files
-
ba3dee926d0876605d69e66c0efed5f1.exe windows:4 windows x86 arch:x86
474aa0dd0dd03ab5bfdc7f18912c9661
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
WriteFile
CreateProcessA
CreateFileA
GetStartupInfoA
GetModuleHandleA
advapi32
RegSetValueExA
RegOpenKeyA
RegCreateKeyA
RegCloseKey
shell32
SHGetSpecialFolderPathA
wininet
InternetQueryDataAvailable
InternetOpenA
InternetCloseHandle
InternetOpenUrlA
HttpQueryInfoA
InternetReadFile
msvcrt
_controlfp
__set_app_type
__p__fmode
__p__commode
ldiv
isxdigit
isupper
isspace
ispunct
isprint
islower
isgraph
isdigit
sprintf
rand
srand
time
isalpha
isalnum
div
ceil
atoi
_except_handler3
atol
??3@YAXPAX@Z
??2@YAPAXI@Z
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
_itoa
Sections
.text Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 608B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 928B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ