Static task
static1
Behavioral task
behavioral1
Sample
be40dd195ab46ee56255eff1f7079144.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
be40dd195ab46ee56255eff1f7079144.exe
Resource
win10v2004-20240226-en
General
-
Target
be40dd195ab46ee56255eff1f7079144
-
Size
156KB
-
MD5
be40dd195ab46ee56255eff1f7079144
-
SHA1
8a9e4df1af374dcd3498ff54fe1ac126a2901ab3
-
SHA256
9558b6fadd79157d4fde7e118e7219e73be417933263743767b1bb366e44d871
-
SHA512
b29938bfbc91037bcd8015a9b8066612d53881423dd158ad04e0577bc51101ccf536472c266c46fd8bd0fea2afa1efe17947987f69b35c6424b0c094b1f5b558
-
SSDEEP
3072:JdkCUa9NGvZN4qTFTcNst8UTDyPIqNHm38s+2IP:JuLs4CstDyPLHhVv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource be40dd195ab46ee56255eff1f7079144
Files
-
be40dd195ab46ee56255eff1f7079144.exe windows:4 windows x86 arch:x86
2e8a8e2c88b5d17d96a706620fd30dd6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLastError
SetFileTime
GetFileAttributesExA
GetVersionExA
GetStartupInfoA
GetModuleHandleA
WriteFile
OpenProcess
GetCurrentProcess
DuplicateHandle
CreateFileA
GetSystemDirectoryA
WinExec
Sleep
CloseHandle
LoadLibraryA
GetProcAddress
GetModuleFileNameA
user32
TranslateMessage
GetMessageA
DefWindowProcA
PostQuitMessage
ShowWindow
CreateWindowExA
RegisterClassExA
DispatchMessageA
GetDesktopWindow
advapi32
RegQueryValueExA
CloseServiceHandle
GetUserNameA
LookupAccountNameA
ConvertSidToStringSidA
OpenSCManagerA
RegCloseKey
RegOpenKeyExA
StartServiceA
OpenServiceA
DeleteService
CreateServiceA
shlwapi
SHDeleteKeyA
SHSetValueA
msvcrt
_exit
_stricmp
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
srand
time
sprintf
_access
rand
??3@YAXPAX@Z
??2@YAPAXI@Z
_except_handler3
fclose
fflush
fwrite
fopen
_XcptFilter
exit
_acmdln
__getmainargs
dbghelp
ImageNtHeader
Sections
.text Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 112KB - Virtual size: 109KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
mdata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
edata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
cdata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
idata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ