Static task
static1
Behavioral task
behavioral1
Sample
c2e607ca05fcf12aaaace0112c1f7f79.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c2e607ca05fcf12aaaace0112c1f7f79.exe
Resource
win10v2004-20240226-en
General
-
Target
c2e607ca05fcf12aaaace0112c1f7f79
-
Size
9KB
-
MD5
c2e607ca05fcf12aaaace0112c1f7f79
-
SHA1
8c239d72ca2b12bf15bc7fbb922acf69ba8ce737
-
SHA256
5b7a13456dca1dd698e64d452eefa60217edb522230f238a4a85ac46cdde31a4
-
SHA512
a0fe935495e6342d33b881d5677cb3b6b73f5af1818b846ec2f91751e1b3652f229e72587650823dc95877e795d6869c37c2e0eea0e4c49db9e29addc7fd1d94
-
SSDEEP
192:qYfxResaiEg+PyADlwGW8aKij22x3qBu7lR:qOH6LijCu7l
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c2e607ca05fcf12aaaace0112c1f7f79
Files
-
c2e607ca05fcf12aaaace0112c1f7f79.exe windows:4 windows x86 arch:x86
7b325348673febe539251b1fa8a9aba8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WinExec
GetCurrentThreadId
GetTickCount
GetTempPathA
lstrcatA
GetPrivateProfileStringA
CreateThread
lstrcpyA
CopyFileA
GetDriveTypeA
GetSystemDirectoryA
GetModuleFileNameA
CreateProcessA
VirtualProtectEx
GetCurrentProcess
GetLastError
CreateMutexA
GetCommandLineA
DeleteFileA
LoadLibraryA
GetProcAddress
Sleep
GetVolumeInformationA
CreateDirectoryA
lstrlenA
advapi32
RegOpenKeyExA
RegDeleteKeyA
RegDeleteValueA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
RegQueryValueExA
msvcrt
fopen
sprintf
malloc
strstr
_strlwr
fclose
Sections
.data Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE