Static task
static1
Behavioral task
behavioral1
Sample
c82470b4174ba989a9fc384b8ddd7f5c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c82470b4174ba989a9fc384b8ddd7f5c.exe
Resource
win10v2004-20240226-en
General
-
Target
c82470b4174ba989a9fc384b8ddd7f5c
-
Size
32KB
-
MD5
c82470b4174ba989a9fc384b8ddd7f5c
-
SHA1
9d7530c92eef3ae58a50f1ab543c4883e667cc33
-
SHA256
6b3ffe1be0f9155de86557c0f8d852e146d97a0e97e0f4ba9aebe06b90b250b4
-
SHA512
04664388d96a83b55fcaf16dd235ec188139d47658061fd6407425c030af94d6a06916a326528f25ae66c79c280bf9e0e285da100ce592eb543ee906d8f50be4
-
SSDEEP
384:IvJave9eB79yx0KtwJ11WsSq7hkDTZDb4v0Vw9oCW/rcIEPAEe/rY8e9JimZKH:GJMe96C0esqYvfWA2EmLQJI
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c82470b4174ba989a9fc384b8ddd7f5c
Files
-
c82470b4174ba989a9fc384b8ddd7f5c.exe windows:4 windows x86 arch:x86
8f6be0945247b08830f284577a83f844
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReleaseMutex
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
CreateEventA
lstrcmpA
CreateFileA
lstrcpyA
CreateDirectoryA
lstrcatA
WaitForMultipleObjects
GetTickCount
GetSystemTimeAsFileTime
FlushFileBuffers
WriteFile
GetStartupInfoA
ExitProcess
GetCommandLineA
GetModuleHandleA
DebugBreak
HeapAlloc
GetProcessHeap
HeapReAlloc
CreateMutexA
MultiByteToWideChar
WideCharToMultiByte
lstrlenW
CreateThread
Sleep
FreeLibrary
GetProcAddress
LoadLibraryA
SetThreadPriority
GetCurrentThread
GetFileAttributesA
GetCurrentProcessId
OpenProcess
LocalFree
GetVersionExA
GetDriveTypeA
lstrcpynA
CreateFileMappingA
SetLastError
DuplicateHandle
GetCurrentProcess
OpenFileMappingA
MapViewOfFile
UnmapViewOfFile
SetEvent
WaitForSingleObject
ResetEvent
GetModuleFileNameA
lstrlenA
GetLastError
HeapFree
CloseHandle
user32
MsgWaitForMultipleObjects
GetMessageA
TranslateMessage
GetKeyboardType
IsWindow
DestroyWindow
UnhookWindowsHookEx
CharNextA
wsprintfA
SetWindowsHookExA
DispatchMessageA
CreateDialogIndirectParamA
advapi32
RegOpenKeyExA
RegQueryValueExA
RegFlushKey
RegSetValueExA
RegCreateKeyExA
RegDeleteValueA
RegCloseKey
shell32
SHGetPathFromIDListA
SHGetMalloc
SHGetSpecialFolderLocation
ole32
StringFromGUID2
version
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
Sections
.text Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE