Static task
static1
Behavioral task
behavioral1
Sample
c9efe2d284ca31a6b11e06fcb505bd0d.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c9efe2d284ca31a6b11e06fcb505bd0d.exe
Resource
win10v2004-20240226-en
General
-
Target
c9efe2d284ca31a6b11e06fcb505bd0d
-
Size
581KB
-
MD5
c9efe2d284ca31a6b11e06fcb505bd0d
-
SHA1
32a5f7d1cac98f2d05bca3a96efa9bb43958ed91
-
SHA256
03a06cae7e0aa40af665ce5dbfcbc8b0583e1b37263581979bdd93a5d3ce4dce
-
SHA512
dac556528df626a4dfeaa2db7bccc2c1b13a18a61ce066d9b4a8cad89a5e0f7a861f3aad0cb7bd8bfd096ee9ac325cdb813a4a7cd3d6a33cfdb5d10e444dbf65
-
SSDEEP
12288:Fb3RumEE0/iTqPDpktyrc1pDZJZfSow1srQ/kyc93TQmZR:AiTlFJJSBcuU9Dx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c9efe2d284ca31a6b11e06fcb505bd0d
Files
-
c9efe2d284ca31a6b11e06fcb505bd0d.exe windows:4 windows x86 arch:x86
1592af4bf4aa3188ee994338a548005d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
TlsSetValue
AddAtomW
InitializeCriticalSectionAndSpinCount
LCMapStringW
GetModuleHandleW
GetCurrentProcess
GetProfileIntW
SetUnhandledExceptionFilter
GetDateFormatA
GetLastError
EnumSystemLocalesA
EnumCalendarInfoExW
WriteConsoleW
GetProcAddress
GetStartupInfoA
GlobalAddAtomW
IsDebuggerPresent
TerminateProcess
GetLocaleInfoW
LoadLibraryExA
IsValidLocale
GetACP
CreateFileA
HeapDestroy
GetStartupInfoW
GetStringTypeW
GetTimeFormatA
GetEnvironmentStringsW
SetFilePointer
GetStringTypeExA
Sleep
UnhandledExceptionFilter
HeapReAlloc
HeapFree
GetConsoleCP
FreeLibrary
GetStdHandle
GetFileType
GetCommandLineW
CloseHandle
GetUserDefaultLCID
GetCurrentThreadId
OpenFile
GetCurrentThread
InterlockedDecrement
FreeEnvironmentStringsW
InterlockedExchange
WideCharToMultiByte
SetEnvironmentVariableA
SetHandleCount
SuspendThread
OpenMutexA
GetPrivateProfileIntW
VirtualFree
WriteFile
IsValidCodePage
GetTimeZoneInformation
WritePrivateProfileSectionW
TlsGetValue
IsBadReadPtr
GetCommandLineA
DeleteCriticalSection
GetModuleFileNameA
WaitForDebugEvent
MultiByteToWideChar
SetStdHandle
GetConsoleOutputCP
GetLocaleInfoA
QueryPerformanceCounter
TlsFree
SetLastError
InterlockedIncrement
SetConsoleCtrlHandler
GetModuleHandleA
GetCurrentProcessId
EnumResourceNamesW
EnterCriticalSection
OpenProcess
LCMapStringA
RtlUnwind
GetStringTypeA
LeaveCriticalSection
CreateMutexA
TlsAlloc
GetCPInfo
VirtualAlloc
WriteConsoleA
LoadLibraryA
HeapSize
GetModuleFileNameW
CompareStringA
FlushFileBuffers
GetConsoleMode
VirtualQuery
ReadFile
HeapCreate
ExitProcess
GetOEMCP
HeapAlloc
CompareStringW
GetSystemTimeAsFileTime
GetTickCount
user32
SetWindowTextW
SetMenuItemInfoW
TranslateMDISysAccel
GetMessageW
EnumDisplayDevicesA
DdeFreeDataHandle
LockWindowUpdate
UnhookWindowsHookEx
RegisterClassA
GetMessageA
CreateAcceleratorTableW
DdeClientTransaction
DlgDirSelectExW
GetWindowLongW
SetShellWindow
IsClipboardFormatAvailable
RegisterClassExA
SetMenuItemBitmaps
EnumDisplayMonitors
NotifyWinEvent
CreateDialogParamW
GetScrollRange
GetMenuItemCount
PostQuitMessage
GetProcessWindowStation
ExitWindowsEx
comctl32
InitCommonControlsEx
Sections
.text Size: 239KB - Virtual size: 239KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 317KB - Virtual size: 316KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ