Static task
static1
Behavioral task
behavioral1
Sample
c358784e6bb2cce1d8856456bbc674b0.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c358784e6bb2cce1d8856456bbc674b0.exe
Resource
win10v2004-20240226-en
General
-
Target
c358784e6bb2cce1d8856456bbc674b0
-
Size
10KB
-
MD5
c358784e6bb2cce1d8856456bbc674b0
-
SHA1
9c9b2ad145f2b607fb141e7633b89165b87b9477
-
SHA256
a55aa8b4638c5ebf4128220a92d45ad6d6b95df2add37be639f323f2cb2fdf64
-
SHA512
64747e13f6c3688ef86fcf11b2268f422b9786811a0dc94ec7cc068910091860ae77b87922799f11c47c525faff578a4773bd332c419892d109bb27a53c20d19
-
SSDEEP
192:uokH9nLH0aNFtHuH6ZektdW3Bc9YnJWn8I8BSaW:uokH9nLH0aNF7ZektdT9eWn8I8BBW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c358784e6bb2cce1d8856456bbc674b0
Files
-
c358784e6bb2cce1d8856456bbc674b0.exe windows:4 windows x86 arch:x86
93b5029f33eab48d822b686f7ed72fd0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ole32
CreateStreamOnHGlobal
kernel32
WriteFile
GetModuleFileNameA
CloseHandle
CreateFileA
CreateFileMappingA
ExitProcess
GetCurrentProcess
GetFileSize
lstrlenA
lstrcpyA
lstrcatA
GetProcAddress
UnmapViewOfFile
Sleep
SetFilePointer
ReadFile
MapViewOfFile
LocalFree
LocalAlloc
LoadLibraryA
GlobalFree
GlobalAlloc
GetLastError
oleaut32
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayCreateVector
advapi32
RegOpenKeyA
LookupPrivilegeValueA
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
AdjustTokenPrivileges
RegEnumValueA
RegCloseKey
OpenProcessToken
shlwapi
StrStrIA
wsock32
send
recv
WSAStartup
Sections
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 148KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE