Static task
static1
Behavioral task
behavioral1
Sample
c58565269c4ee0fd7166c4ad3baf46c0.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
c58565269c4ee0fd7166c4ad3baf46c0.exe
Resource
win10v2004-20231215-en
General
-
Target
c58565269c4ee0fd7166c4ad3baf46c0
-
Size
121KB
-
MD5
c58565269c4ee0fd7166c4ad3baf46c0
-
SHA1
553837d4259ecb3af88da676ffffc321f49d1cf5
-
SHA256
cb59497763c14647ec1dd057fec5f4370b56b79bc7ab7f88bfc1dc1cd78105ab
-
SHA512
4c61ab06bf6c9a6d3b07f1b6f084bdf21bbd5bf396008bcf392805044df4fc151283d31f23bf29886b7350433268eff3aaf7068fec32d9f5a9b2b4e9ffd46c38
-
SSDEEP
3072:XtrPCNMM6dFs0O+/PyGXmVVc6etbYMdoH:B6OFbO+/PLXmDcN7dA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c58565269c4ee0fd7166c4ad3baf46c0
Files
-
c58565269c4ee0fd7166c4ad3baf46c0.exe windows:5 windows x86 arch:x86
00688c9433a271b4dcbbebded2cd942d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
msvcr90
_controlfp_s
_invoke_watson
_except_handler4_common
_decode_pointer
_onexit
_lock
__dllonexit
_unlock
?terminate@@YAXXZ
_crt_debugger_hook
__set_app_type
_encode_pointer
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
_exit
_cexit
__getmainargs
_amsg_exit
fseek
__argc
__argv
??2@YAPAXI@Z
isalpha
islower
isupper
tolower
fprintf
memcmp
_strupr
_access
wcscat
fwrite
malloc
feof
realloc
fread
free
strtok
strcpy
strchr
strtoul
fopen
fgets
fclose
strcat
_splitpath
strstr
atoi
_vsnprintf
_snprintf
strcmp
srand
strncmp
memset
strlen
sscanf
rand
memcpy
strncpy
strrchr
sprintf
strncat
_wcsicmp
kernel32
GetTickCount
GetSystemTimeAsFileTime
GetCurrentThreadId
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetStartupInfoA
InterlockedCompareExchange
InterlockedExchange
GlobalMemoryStatus
QueryPerformanceFrequency
QueryPerformanceCounter
GenerateConsoleCtrlEvent
TerminateThread
WaitForMultipleObjects
CreateMutexA
WaitForSingleObject
GetCurrentProcessId
GetVersionExA
GetLocaleInfoA
GetComputerNameA
SetConsoleCtrlHandler
CreatePipe
DuplicateHandle
PeekNamedPipe
GetExitCodeProcess
GetCurrentProcess
TerminateProcess
WideCharToMultiByte
CopyFileA
SetFileAttributesA
ExpandEnvironmentStringsA
GetFileTime
SetFileTime
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
GlobalLock
GlobalUnlock
LoadLibraryExA
FormatMessageA
GetModuleHandleA
GetFileAttributesA
GetDateFormatA
GetTimeFormatA
OpenProcess
GetSystemInfo
ReadProcessMemory
VirtualQueryEx
FileTimeToLocalFileTime
FileTimeToSystemTime
GetProcessHeap
HeapAlloc
HeapFree
LoadLibraryA
GetProcAddress
GetEnvironmentVariableW
FreeLibrary
FindFirstFileA
FindNextFileA
FindClose
TransactNamedPipe
WriteFile
MultiByteToWideChar
CreateFileA
GetFileSize
SetFilePointer
ReadFile
CloseHandle
MoveFileA
CreateProcessA
GetTempPathA
Sleep
GetLastError
CreateThread
GetModuleFileNameA
ExitThread
LeaveCriticalSection
EnterCriticalSection
DeleteFileA
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GetLocalTime
ExitProcess
GetSystemDirectoryA
Sections
.text Size: 84KB - Virtual size: 83KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 182KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 688B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ