Static task
static1
Behavioral task
behavioral1
Sample
19ff480582b48636802886cc0b8090e0d39879b7b901f662bdf03f66fba7aba9.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
19ff480582b48636802886cc0b8090e0d39879b7b901f662bdf03f66fba7aba9.exe
Resource
win10v2004-20240226-en
General
-
Target
19ff480582b48636802886cc0b8090e0d39879b7b901f662bdf03f66fba7aba9
-
Size
213KB
-
MD5
9cb1aacce46abf6a4918b171617d22c3
-
SHA1
eac8413d082575235f9e80edb2dbb7199327d174
-
SHA256
19ff480582b48636802886cc0b8090e0d39879b7b901f662bdf03f66fba7aba9
-
SHA512
7d9163219138f30f0e6b664dc77156a1a2ccefad9ceb5b11794a3723b16dfe20c65997de52716799b945ec4f7eff25759b19d91bb955a5a8bfd9339acdf6d456
-
SSDEEP
3072:1AT9HZtoeMTDApmnirZRrxrt+Uwb53blCy4RbR:1AT95toFDAMQZRrLzy4R1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 19ff480582b48636802886cc0b8090e0d39879b7b901f662bdf03f66fba7aba9
Files
-
19ff480582b48636802886cc0b8090e0d39879b7b901f662bdf03f66fba7aba9.exe windows:5 windows x86 arch:x86
83b4d9bc0c65c322eeb631d44fed51b2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LeaveCriticalSection
CreateDirectoryA
EnterCriticalSection
DeleteFileA
WaitForSingleObject
Sleep
TerminateProcess
ExitProcess
GetTickCount
InitializeCriticalSectionAndSpinCount
GetLastError
SetFileAttributesA
GetModuleFileNameA
CreateMutexA
DeleteCriticalSection
CloseHandle
CreateFileA
WriteFile
InterlockedDecrement
GetCurrentProcess
Process32First
OpenProcess
WideCharToMultiByte
CreateProcessA
SetLastError
Process32Next
CreateToolhelp32Snapshot
SetEndOfFile
CreateFileW
SetEnvironmentVariableA
LoadLibraryW
OutputDebugStringW
WriteConsoleW
SetStdHandle
ReadConsoleW
HeapReAlloc
GetOEMCP
IsValidCodePage
SetFilePointer
GetACP
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetModuleFileNameW
HeapSize
GetConsoleMode
GetConsoleCP
FlushFileBuffers
SetFilePointerEx
ReadFile
AreFileApisANSI
GetModuleHandleExW
GetProcessHeap
GetFileType
GetStdHandle
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
InterlockedIncrement
EncodePointer
DecodePointer
MultiByteToWideChar
GetStringTypeW
lstrlenA
LocalFree
HeapFree
CreateThread
GetCurrentThreadId
ExitThread
GetProcAddress
LoadLibraryExW
IsDebuggerPresent
IsProcessorFeaturePresent
GetCommandLineA
RaiseException
RtlUnwind
HeapAlloc
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
CompareStringW
LCMapStringW
user32
GetCursorPos
DispatchMessageA
ShowWindow
DefWindowProcA
CreateWindowExA
TranslateMessage
PostQuitMessage
RegisterClassExA
GetMessageA
UpdateWindow
ole32
CoSetProxyBlanket
CoInitializeSecurity
CoInitializeEx
CoUninitialize
CoCreateInstance
oleaut32
SysAllocString
VariantClear
SysFreeString
ws2_32
connect
WSAStartup
WSAGetLastError
htons
WSACleanup
recv
send
gethostbyname
closesocket
socket
Sections
.text Size: 121KB - Virtual size: 120KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 34KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.htext Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE