Static task
static1
Behavioral task
behavioral1
Sample
c89330f8982e356a8fe7c6ed4bbbbc35.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c89330f8982e356a8fe7c6ed4bbbbc35.exe
Resource
win10v2004-20240226-en
General
-
Target
c89330f8982e356a8fe7c6ed4bbbbc35
-
Size
265KB
-
MD5
c89330f8982e356a8fe7c6ed4bbbbc35
-
SHA1
7b8a5e47687169a747fb0baa038181cc8c20a306
-
SHA256
fd2e1cfdcfdd6218578128ea58ab90d377db543c54e14759dad0a647a9343510
-
SHA512
f811dba0332342d162818412cb6cf8e223a9dc6d6de1b4cc3c47001f09b990c58026fc4fca56410d02b48587de2fd47dae810d0bb2f9b7a1f929fedccfdfc2ee
-
SSDEEP
6144:m+lXbW+BfrQIsEreTDA91yXOPr92odusI3F/tRSdKb:3lrPlQIsIussM96fRS0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c89330f8982e356a8fe7c6ed4bbbbc35
Files
-
c89330f8982e356a8fe7c6ed4bbbbc35.exe windows:4 windows x86 arch:x86
5a3ee38af4e756ea7325408a604ab5c1
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
IsDebuggerPresent
WaitForSingleObject
CreateSemaphoreW
EnumDateFormatsExA
ReleaseSemaphore
GetCommandLineW
GetProcAddress
LoadLibraryW
FreeLibrary
DeleteFileW
LocalAlloc
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetStartupInfoA
InterlockedCompareExchange
InterlockedExchange
GetModuleHandleW
GetProcessHeap
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
VirtualProtect
GetCurrentThreadId
FoldStringW
GetLocaleInfoW
Sleep
oleaut32
SafeArrayDestroyDescriptor
SysAllocStringByteLen
SafeArraySetIID
SysReAllocStringLen
OleIconToCursor
ClearCustData
SetOaNoCache
msvfw32
ICInfo
Sections
.text Size: 169KB - Virtual size: 205KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 92KB - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 284B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ