Static task
static1
Behavioral task
behavioral1
Sample
c0964d07d2a4729c433d6fb5ab2df587.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c0964d07d2a4729c433d6fb5ab2df587.exe
Resource
win10v2004-20231215-en
General
-
Target
c0964d07d2a4729c433d6fb5ab2df587
-
Size
254KB
-
MD5
c0964d07d2a4729c433d6fb5ab2df587
-
SHA1
08543ced8bdbc9551c4b8fe6fb00f0bfe5022ff7
-
SHA256
28abbc6ef1d12dd32dae3ca0aae9ca97e254e0b85ba4dc5058cc88965e058cbc
-
SHA512
f53162c053feddfbf27dd026b1e9b628aa3f383af77d91e264c4d44b395aff7ce3d8caf7e84f495ebb2a9c9adc18dd62eae87507458870281df4750b7ced7581
-
SSDEEP
6144:HlHRK6RZ/LuFzEDTMZZfIZXNjNsRJNaNWx0IKaZhWZKln10j:HlHg63/LuAMQjsNaIxNTZhCA10j
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c0964d07d2a4729c433d6fb5ab2df587
Files
-
c0964d07d2a4729c433d6fb5ab2df587.exe windows:4 windows x86 arch:x86
50f763d828d1e1a7b372651b0f5de0b9
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
netapi32
NetApiBufferFree
NetUserEnum
kernel32
lstrcmpW
CompareFileTime
lstrlenA
lstrlenW
lstrcpynW
FreeLibrary
CreateDirectoryW
LocalAlloc
RemoveDirectoryW
GetWindowsDirectoryW
LocalFree
IsDebuggerPresent
GetCurrentThreadId
WaitForSingleObject
CreateEventW
ExpandEnvironmentStringsA
OpenEventW
GetModuleHandleW
GetTempPathW
SetUnhandledExceptionFilter
GetVersion
GetProcAddress
user32
GetForegroundWindow
GetSystemMetrics
CopyRect
RegisterWindowMessageW
GetCursorPos
InvalidateRect
GetFocus
LoadCursorW
DestroyIcon
GetSysColor
MoveWindow
IsWindow
GetTopWindow
SetTimer
OffsetRect
PostMessageW
SetWindowPos
SendMessageW
EnableWindow
gdi32
CreateFontIndirectW
CreateRectRgn
CreateCompatibleDC
DeleteObject
CreatePatternBrush
CreateSolidBrush
advapi32
IsValidSecurityDescriptor
FreeSid
RegOpenKeyExA
RegQueryValueExA
OpenServiceW
StartServiceW
QueryServiceStatus
OpenSCManagerW
CloseServiceHandle
RegCreateKeyExW
RegDeleteValueW
RegSetValueExW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
RevertToSelf
AddAccessAllowedAce
SetSecurityDescriptorOwner
AllocateAndInitializeSid
InitializeAcl
ImpersonateSelf
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
AccessCheck
SetSecurityDescriptorGroup
OpenThreadToken
OpenProcessToken
GetLengthSid
shell32
ShellExecuteW
usp10
UspFreeMem
ScriptApplyDigitSubstitution
ScriptCPtoX
ScriptJustify
icmp
IcmpCloseHandle
IcmpParseReplies
Sections
.text Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.IjU Size: 2KB - Virtual size: 207KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.kXA Size: 2KB - Virtual size: 395KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ze Size: 2KB - Virtual size: 543KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 2KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UsAk Size: 2KB - Virtual size: 310KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.CW Size: 93KB - Virtual size: 138KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.XLbC Size: 2KB - Virtual size: 74KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 7KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.w Size: 122KB - Virtual size: 156KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ