Static task
static1
Behavioral task
behavioral1
Sample
c9b3c053911d32bedf236c5bf069a542.exe
Resource
win7-20240221-en
General
-
Target
c9b3c053911d32bedf236c5bf069a542
-
Size
480KB
-
MD5
c9b3c053911d32bedf236c5bf069a542
-
SHA1
8fde739848eb9e1914afd52eea7cf24bc153819e
-
SHA256
8f4b994eebeb2e75e0cd87b3a432361a8e9ad9a6bed1e8c2f4ffe772cb2bf52c
-
SHA512
f28b357c1d144c578011f053e4c94ba15f029029434edfe51ba451b269ce630e42eb9788b50bb1d9887bfb9ac651dc8257441514f0e54078088e9baebd449acd
-
SSDEEP
6144:BTF+8Rh6T3PUWpFrpUrf5u62fZGJLAyNsyqhJy1oNVF0S1DDNgQVZDXhz:ZFn/OUqFbfMJMey4unNDNgQVZDZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c9b3c053911d32bedf236c5bf069a542
Files
-
c9b3c053911d32bedf236c5bf069a542.exe windows:4 windows x86 arch:x86
0977cf6ed6fc3389b62b80e4b243871c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CompareStringW
Sleep
SetNamedPipeHandleState
DuplicateHandle
CreatePipe
SetFilePointer
CreateFileA
GetExitCodeProcess
ReadFile
FlushFileBuffers
WriteFile
LocalFree
LocalAlloc
GetCurrentThread
GetProcAddress
GetModuleHandleA
GetUserDefaultLangID
GetModuleFileNameA
GetWindowsDirectoryA
GetSystemDirectoryA
CompareStringA
FreeLibrary
LoadLibraryW
GetCurrentProcess
GetStartupInfoA
CreateProcessA
WaitForSingleObject
CloseHandle
GetCommandLineA
FindResourceExA
FindResourceA
LoadResource
LockResource
SizeofResource
DeleteCriticalSection
InitializeCriticalSection
GetLastError
InterlockedExchange
RaiseException
WideCharToMultiByte
MultiByteToWideChar
GetVersionExA
GetThreadLocale
GetLocaleInfoA
SetEndOfFile
LoadLibraryA
GetStringTypeW
GetStringTypeA
IsBadCodePtr
IsBadReadPtr
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetTimeZoneInformation
LCMapStringW
LCMapStringA
GetStdHandle
SetHandleCount
GetCPInfo
GetOEMCP
SetUnhandledExceptionFilter
TerminateProcess
IsBadWritePtr
GetACP
GetCurrentProcessId
VirtualFree
HeapCreate
ExitProcess
GetDateFormatA
GetTimeFormatA
GetSystemTimeAsFileTime
GetFileType
SetStdHandle
RtlUnwind
VirtualQuery
EnterCriticalSection
LeaveCriticalSection
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
VirtualProtect
VirtualAlloc
GetSystemInfo
SetEnvironmentVariableA
advapi32
ImpersonateSelf
RegCloseKey
RegOpenKeyExA
RegEnumKeyA
RegQueryValueExW
OpenThreadToken
AllocateAndInitializeSid
InitializeSecurityDescriptor
GetLengthSid
InitializeAcl
AddAccessAllowedAce
SetSecurityDescriptorDacl
SetSecurityDescriptorGroup
SetSecurityDescriptorOwner
IsValidSecurityDescriptor
AccessCheck
FreeSid
RevertToSelf
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegOpenKeyA
RegQueryValueExA
user32
SendMessageA
CreateDialogParamA
ShowWindow
IsDialogMessageA
TranslateMessage
DispatchMessageA
PeekMessageA
MsgWaitForMultipleObjects
GetDlgItem
DestroyWindow
SetDlgItemTextA
GetDesktopWindow
GetWindowRect
CopyRect
OffsetRect
SetWindowPos
PostQuitMessage
MessageBoxA
ExitWindowsEx
comctl32
ord17
Sections
.text Size: 52KB - Virtual size: 50KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 240KB - Virtual size: 236KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.text Size: 168KB - Virtual size: 168KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE