Static task
static1
Behavioral task
behavioral1
Sample
c1a1e1946e0d750087e57ac67a5c3ce4.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
c1a1e1946e0d750087e57ac67a5c3ce4.exe
Resource
win10v2004-20231215-en
General
-
Target
c1a1e1946e0d750087e57ac67a5c3ce4
-
Size
56KB
-
MD5
c1a1e1946e0d750087e57ac67a5c3ce4
-
SHA1
da6cea0211746ad87ecdf58f6f32de8650cf4657
-
SHA256
1ac7f4cee8b614359cb0997c1934e8b2e4cab0bbfddfa84bedb6d1b2f55e26f3
-
SHA512
f0867c3d21fefad0dc494c7d6914f70bf7abc6d3f3529d585a7b6779195c443500e8ef0096e29c9aef2bc10bf986004b49a57e75699460b840c695dfd78d06a4
-
SSDEEP
384:fSWgFGTNJET3NiyGkZNCMpRsQ7uV40IfXw0rh3vLAX1xq3UZU92psWmjSAy:bgcszsQIzoXwQpLALZU99I
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c1a1e1946e0d750087e57ac67a5c3ce4
Files
-
c1a1e1946e0d750087e57ac67a5c3ce4.exe windows:5 windows x86 arch:x86
4acf7c33586da795496bf9178bed67f4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
Process32First
CloseHandle
Process32Next
CreateToolhelp32Snapshot
GetComputerNameA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetFileAttributesA
GetTickCount
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetStartupInfoA
InterlockedCompareExchange
InterlockedExchange
GetModuleFileNameA
GetLastError
CreateSemaphoreA
GetCurrentThreadId
Sleep
user32
LoadIconA
LoadCursorA
RegisterClassExA
CreateWindowExA
ShowWindow
LoadAcceleratorsA
LoadStringA
EndDialog
PostQuitMessage
EndPaint
BeginPaint
DefWindowProcA
DestroyWindow
DialogBoxParamA
UpdateWindow
advapi32
GetUserNameA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegGetValueA
RegCreateKeyExA
shell32
ShellExecuteA
SHGetFolderPathA
msvcp90
??_D?$basic_ifstream@DU?$char_traits@D@std@@@std@@QAEXXZ
?read@?$basic_istream@DU?$char_traits@D@std@@@std@@QAEAAV12@PADH@Z
??0?$basic_ifstream@DU?$char_traits@D@std@@@std@@QAE@PBDHH@Z
?close@?$basic_ifstream@DU?$char_traits@D@std@@@std@@QAEXXZ
ws2_32
WSAStartup
inet_addr
htons
socket
connect
closesocket
send
recv
getaddrinfo
inet_ntoa
freeaddrinfo
shlwapi
PathAddBackslashA
PathAppendA
msvcr90
_lock
_unlock
memcpy
memset
_controlfp_s
_invoke_watson
_except_handler4_common
_decode_pointer
__dllonexit
_onexit
?terminate@@YAXXZ
_crt_debugger_hook
__set_app_type
_encode_pointer
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
__CxxFrameHandler3
_initterm
_acmdln
_ismbblead
_time64
exit
srand
rand
fopen
fprintf
fclose
printf
strstr
fwrite
strcat_s
_itoa_s
strcpy_s
_amsg_exit
__getmainargs
_cexit
_exit
_XcptFilter
Sections
.text Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 27KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ