Static task
static1
Behavioral task
behavioral1
Sample
c62ad551a0323f1eb160239da5169faa.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c62ad551a0323f1eb160239da5169faa.exe
Resource
win10v2004-20240226-en
General
-
Target
c62ad551a0323f1eb160239da5169faa
-
Size
648KB
-
MD5
c62ad551a0323f1eb160239da5169faa
-
SHA1
05a86033e0077638a70a50083b6c97d2fe5717a5
-
SHA256
24cac26a6d1e32cb7dd272561b246eb294a62763d77c9e5f13521f03cede2fd2
-
SHA512
1b8d1284b4e3b2d16cb4c9f2b9a6cad95c09b1b994611cd0e8d5332e3985b7bfdd08c1ff862c39b48c7f2b021b89efa3c2d6ab2eb7a7b719e02cb5474297bf64
-
SSDEEP
6144:eGa+Gs7HbyqHfHoWeu/aHlfEjGXdsYOdLmXj1i5HQ1bSf9Hu1e7kYNhRLfPIqshl:oa7ytW52EjUdpOdLsWH/XgYNhRbPxED
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c62ad551a0323f1eb160239da5169faa
Files
-
c62ad551a0323f1eb160239da5169faa.exe windows:4 windows x86 arch:x86
4be7c0c4228c6a294bdbe93b5e915ce1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
MultiByteToWideChar
GetVolumeInformationA
FindClose
FindFirstFileA
FindNextFileA
SetFileTime
SystemTimeToFileTime
GetSystemTime
CopyFileA
Sleep
DeleteFileA
GetModuleFileNameA
GetModuleHandleA
GetSystemDirectoryA
lstrcatA
GetTickCount
ExitProcess
WaitForSingleObject
FreeLibrary
GetProcAddress
CreateFileA
GetPrivateProfileStringA
GetTempFileNameA
GetWindowsDirectoryA
GetLastError
CreateMutexA
InitializeCriticalSection
DeleteCriticalSection
RaiseException
SetEndOfFile
GetLocaleInfoW
GetOEMCP
SetStdHandle
ReadFile
lstrlenA
GetFileSize
CloseHandle
WriteFile
GetLocaleInfoA
GetACP
InterlockedExchange
LoadLibraryA
GetVersionExA
IsBadCodePtr
IsBadReadPtr
GetSystemInfo
VirtualProtect
GetStringTypeW
GetStringTypeA
IsValidCodePage
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
RtlUnwind
HeapFree
GetStartupInfoA
GetCommandLineA
HeapReAlloc
HeapAlloc
LCMapStringA
WideCharToMultiByte
LCMapStringW
GetCPInfo
QueryPerformanceCounter
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
SetFilePointer
FlushFileBuffers
SetUnhandledExceptionFilter
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
HeapSize
VirtualQuery
GetStdHandle
UnhandledExceptionFilter
user32
UpdateWindow
CreateWindowExA
RegisterClassExA
LoadCursorA
LoadIconA
DispatchMessageA
TranslateMessage
PeekMessageA
ShowWindow
advapi32
RegOpenKeyA
RegSetValueExA
RegCloseKey
OpenSCManagerA
OpenServiceA
CloseServiceHandle
QueryServiceStatus
StartServiceA
RegCreateKeyExA
shell32
SHGetPathFromIDListA
SHGetMalloc
SHGetSpecialFolderLocation
ole32
CoInitialize
CoUninitialize
CoCreateInstance
wininet
InternetConnectA
InternetCloseHandle
InternetReadFile
HttpQueryInfoA
HttpSendRequestA
InternetOpenA
InternetCrackUrlA
HttpOpenRequestA
Sections
.text Size: 592KB - Virtual size: 589KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 32KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE