Static task
static1
Behavioral task
behavioral1
Sample
c0c39df73959bbef732e077a30a17f19.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c0c39df73959bbef732e077a30a17f19.exe
Resource
win10v2004-20240226-en
General
-
Target
c0c39df73959bbef732e077a30a17f19
-
Size
416KB
-
MD5
c0c39df73959bbef732e077a30a17f19
-
SHA1
3343352f37a54e8750b567bfcb8416bda0015037
-
SHA256
49a5ab067eeccc348efab668be941853c477e0d6a41e60962a7cb90294e93d1c
-
SHA512
1b117962c9e966e1e2e32df72fb022e1576c3763da091bcd2c7304a12fb9ca1edde088c653de1eb04be6f9138e0b8b56d758493dee64c0ed4f8b8be8c83225cc
-
SSDEEP
12288:OnrH8PAkNkVhkkuK2Qtm98oQ8wUDXVzwl:tPACkPz2EG8opHlw
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c0c39df73959bbef732e077a30a17f19
Files
-
c0c39df73959bbef732e077a30a17f19.exe windows:4 windows x86 arch:x86
70ee4b41eca2580697a841c2a5d49132
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReleaseMutex
CloseHandle
GetComputerNameW
LoadLibraryA
SetEvent
GetLocalTime
CreateFileA
GetCommandLineW
GetProcessHeap
FindAtomA
ReleaseMutex
lstrcpynA
ExitThread
GetDiskFreeSpaceW
GetTickCount
GetDriveTypeA
GetFileAttributesW
HeapCreate
LocalFree
LoadLibraryW
user32
FillRect
CloseWindow
DestroyCaret
GetClipCursor
DrawStateA
GetDlgItem
GetKeyState
GetClassInfoA
GetComboBoxInfo
CallWindowProcA
SetFocus
CreateWindowExA
DispatchMessageA
snmpapi
SnmpUtilMemAlloc
SnmpTfxClose
SnmpTfxOpen
SnmpTfxQuery
SnmpUtilMemFree
appwiz.cpl
ConfigStartMenu
Sections
.text Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 336KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 404KB - Virtual size: 403KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ