Static task
static1
Behavioral task
behavioral1
Sample
c599971fa7858db8891d2efb5c8504a9.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c599971fa7858db8891d2efb5c8504a9.exe
Resource
win10v2004-20231215-en
General
-
Target
c599971fa7858db8891d2efb5c8504a9
-
Size
822KB
-
MD5
c599971fa7858db8891d2efb5c8504a9
-
SHA1
30b89722e498754eb3d9e122b7bb99a98e1e87a8
-
SHA256
16d3d70ed2240e9b2c3a4d33925ececbd20a5e30c024fc39657c32ad997c7b4c
-
SHA512
b4ebb6ef71a4c5dbe87c3f2b8385a3cf1a8134cefc2dcf12c7d188d51e495bb6769af0d2b544da409b6cad22fa2af8a24e44d05df3f4b9cf82533fd8fa24c0ee
-
SSDEEP
12288:Avu9eN1lw6Hf96eYCgIauYtCb+HXSE2imsjTY0/ETr1Rbl/c8Wtxb6:AvmeS6HYCxf+j2imQY0sTr/l/YS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c599971fa7858db8891d2efb5c8504a9
Files
-
c599971fa7858db8891d2efb5c8504a9.exe windows:4 windows x86 arch:x86
6f5cda9803004e478526325e1c1ea81c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
GlobalSize
CreateMutexA
VirtualAlloc
LocalFree
GetACP
GetPrivateProfileIntW
GlobalFree
InterlockedExchange
GetModuleHandleW
GetEnvironmentVariableA
FindVolumeClose
GetDriveTypeW
ResetEvent
GetExitCodeProcess
WriteFile
CreateEventA
lstrlenA
GetCommandLineA
ResumeThread
user32
GetSysColor
GetClientRect
GetKeyboardType
CallWindowProcW
GetSysColor
GetClassInfoA
SetFocus
CreateWindowExA
GetCursorInfo
DispatchMessageA
DrawStateW
EndDialog
IsWindow
avicap32
videoThunk32
videoThunk32
AppCleanup
videoThunk32
videoThunk32
sysdm.cpl
NoExecuteAddFileOptOutList
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 812KB - Virtual size: 812KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ