Static task
static1
Behavioral task
behavioral1
Sample
c741a03d8dbb517ee084341c96800af3.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c741a03d8dbb517ee084341c96800af3.exe
Resource
win10v2004-20240226-en
General
-
Target
c741a03d8dbb517ee084341c96800af3
-
Size
348KB
-
MD5
c741a03d8dbb517ee084341c96800af3
-
SHA1
966a861d131563618f6f0e63dca56f3367febc06
-
SHA256
cebea8a633d55a6243dcd127f45ceb5ae9c7f600b43cd5d42281051d289e1e68
-
SHA512
c11600d346920c58db45e1d61de9a22fae473fa76b5fecfa325c3e898b0f6e91275b819416c7d825d5a94c7bb17da354b09b93441c15b638dc4cd8fd2b1365c4
-
SSDEEP
6144:NHBaHuPvYFQfQJPNuJ4EgKh0v0x611U5Ya+mgKppNcZ47deY83+nTE5lV:NhaOeQfQJP1VAP6nU5oaP6Z4peAnT2lV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c741a03d8dbb517ee084341c96800af3
Files
-
c741a03d8dbb517ee084341c96800af3.exe windows:4 windows x86 arch:x86
e5387b1cc1d64dc08cb8b65c6a25bcab
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreatePipe
DuplicateConsoleHandle
OpenMutexA
GetNamedPipeInfo
LocalAlloc
SetThreadPriorityBoost
SetFileTime
GetTempPathA
Module32Next
GetConsoleMode
GetModuleHandleA
SizeofResource
PeekConsoleInputA
SetDllDirectoryA
GetVolumeInformationA
GetSystemWindowsDirectoryA
SetConsoleFont
SetFileApisToANSI
OpenThread
LCMapStringA
GetLogicalDriveStringsA
GetCurrencyFormatA
UnlockFile
GetLocaleInfoA
SetMailslotInfo
GetLogicalDrives
BeginUpdateResourceA
IsBadReadPtr
ReadConsoleOutputCharacterA
FindVolumeClose
PeekNamedPipe
WriteConsoleInputA
GetCommandLineA
GetUserDefaultUILanguage
GetAtomNameA
PurgeComm
GetCurrentDirectoryA
GetDiskFreeSpaceA
SetFileShortNameA
CreateTimerQueueTimer
MoveFileWithProgressA
VirtualAllocEx
DisconnectNamedPipe
WriteFileGather
HeapDestroy
GetCommTimeouts
TransmitCommChar
SetLocalPrimaryComputerNameA
GetCurrentConsoleFont
HeapAlloc
IsValidLanguageGroup
OpenWaitableTimerA
CompareStringA
SetTimerQueueTimer
FreeEnvironmentStringsA
GetConsoleOutputCP
GetCurrentProcessId
SetLocalPrimaryComputerNameA
GetVersionExA
GetPrivateProfileStringA
GetPrivateProfileSectionNamesA
GetProfileStringA
GlobalAddAtomA
GlobalFindAtomA
GetDefaultCommConfigA
CopyFileExW
GetVersionExA
GetFileAttributesExA
SetInformationJobObject
VerifyVersionInfoA
GlobalHandle
CompareFileTime
RemoveDirectoryA
OpenSemaphoreA
SetFilePointer
SetFileAttributesA
GetFileTime
ReplaceFileA
_hwrite
GetCPInfoExA
ResumeThread
MultiByteToWideChar
GetConsoleFontSize
QueryDosDeviceA
_lwrite
GetTickCount
GetTapeParameters
GetTickCount
GetModuleHandleA
GetExitCodeThread
LoadLibraryExW
SetFileAttributesA
LockFile
GetDiskFreeSpaceExA
DeleteTimerQueueTimer
Module32First
SetThreadUILanguage
DeleteTimerQueueEx
GetVolumePathNameA
ReadConsoleA
WriteConsoleInputA
FreeLibrary
DeleteTimerQueueTimer
ChangeTimerQueueTimer
GetThreadPriorityBoost
GetStdHandle
IsValidLanguageGroup
GetOverlappedResult
GetThreadPriorityBoost
GetPriorityClass
LocalCompact
VirtualLock
WriteConsoleInputA
TransactNamedPipe
AddAtomA
GetLocalTime
PeekNamedPipe
EndUpdateResourceA
PrepareTape
GetVersionExA
VirtualFree
WriteProcessMemory
FreeEnvironmentStringsA
HeapSize
GetFileTime
AllocConsole
GetProcessHeaps
GetVersion
lstrcmpi
GetWindowsDirectoryA
ProcessIdToSessionId
WaitForSingleObject
GetEnvironmentVariableA
GetBinaryTypeA
GetDefaultCommConfigA
FlushConsoleInputBuffer
GetProcessHeaps
IsDebuggerPresent
DefineDosDeviceA
GetProcessHandleCount
DebugBreak
SetLocalTime
Heap32Next
CompareFileTime
GetLocalTime
GlobalAddAtomA
CommConfigDialogA
CreateSocketHandle
SetConsoleCursor
RemoveDirectoryA
GetFileSize
ReadConsoleA
GetSystemTimeAdjustment
TerminateProcess
SetThreadLocale
GetSystemInfo
ReplaceFileA
GlobalGetAtomNameA
EscapeCommFunction
IsBadStringPtrA
WriteConsoleInputA
FindFirstChangeNotificationA
GetConsoleCursorMode
GetProcessShutdownParameters
BuildCommDCBAndTimeoutsA
VirtualQuery
GetSystemTimes
GetShortPathNameA
PostQueuedCompletionStatus
Sleep
LockFileEx
GetCurrentThread
PulseEvent
SetLocaleInfoA
IsBadStringPtrA
GetProfileSectionA
user32
LockWindowUpdate
GetParent
SetMessageExtraInfo
OemToCharBuffA
InflateRect
IsCharAlphaNumericA
OemKeyScan
DrawIconEx
GetTitleBarInfo
ToAscii
GetMessageA
SystemParametersInfoA
FlashWindowEx
GetUpdateRgn
AppendMenuA
GetAltTabInfoA
DrawIcon
EnumWindows
GetKeyboardLayoutList
CreateWindowStationW
RegisterDeviceNotificationA
EndDialog
IntersectRect
GetWindowDC
RecordShutdownReason
GetWindowPlacement
GetProgmanWindow
SetWindowWord
DrawCaptionTempA
EnumThreadWindows
SetClassLongA
SetShellWindowEx
UnregisterClassA
SetMenuInfo
CalcMenuBar
GetProcessDefaultLayout
GetProcessWindowStation
UpdateLayeredWindow
GetShellWindow
SetWindowLongA
GetTabbedTextExtentA
GetUpdateRgn
CheckMenuItem
RegisterClassA
GetSystemMenu
CharLowerA
MapVirtualKeyExA
CountClipboardFormats
SetMessageExtraInfo
SendNotifyMessageA
CheckDlgButton
SetDlgItemInt
TranslateMessage
AppendMenuA
SetCursorPos
InternalGetWindowText
CreateDialogParamA
DrawStateA
DisplayExitWindowsWarnings
LockSetForegroundWindow
MessageBoxTimeoutW
GetWindowPlacement
GetInputDesktop
GetSystemMetrics
EnumPropsExW
GetClassInfoExA
EnumWindowStationsA
GetKeyboardState
GetAncestor
GetMenuState
RegisterUserApiHook
SendMessageCallbackA
GetRawInputData
ToAsciiEx
RegisterClassExA
MessageBoxExA
InternalGetWindowText
RegisterServicesProcess
LoadIconA
CheckMenuItem
MapVirtualKeyExW
DestroyCaret
CharUpperA
GetWindowTextA
SetSystemMenu
SetCapture
GetDlgCtrlID
EnumDisplaySettingsExW
CopyAcceleratorTableA
advapi32
IsValidSid
Sections
.itext Size: - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.text Size: 176KB - Virtual size: 446KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 100KB - Virtual size: 99KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 68KB - Virtual size: 65KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ