Static task
static1
Behavioral task
behavioral1
Sample
cda35ff81431a2b473205708fdb467f6.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cda35ff81431a2b473205708fdb467f6.exe
Resource
win10v2004-20240226-en
General
-
Target
cda35ff81431a2b473205708fdb467f6
-
Size
9KB
-
MD5
cda35ff81431a2b473205708fdb467f6
-
SHA1
15c56e548963a2ad0ce439a048b9b94d9eb9f924
-
SHA256
6cb3367a52abc5c2fde3b15a98b52118171169771d57a111463507d744ce7878
-
SHA512
1b899c087e217598a5e4e525286388cc4d1a6b45196e69c9ee2dc3c41c5e8e97fb6b2c759d317e8d02ce2bef0298489ef51f39a7f6f4167ba9f6470afd87b468
-
SSDEEP
192:qUXF1TwL8w8NVJsm6/NesDD9H1RdsiB67lR:qm55h/ipNeUTOc67l
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource cda35ff81431a2b473205708fdb467f6
Files
-
cda35ff81431a2b473205708fdb467f6.exe windows:4 windows x86 arch:x86
7e04a6da7ed54750de120428ffd3df91
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WinExec
GetCurrentThreadId
GetTickCount
GetTempPathA
lstrcatA
CopyFileA
GetSystemDirectoryA
lstrcpyA
CreateThread
GetDriveTypeA
CreateDirectoryA
GetModuleFileNameA
CreateProcessA
VirtualProtectEx
GetCurrentProcess
GetLastError
CreateMutexA
GetCommandLineA
DeleteFileA
LoadLibraryA
GetProcAddress
Sleep
GetVolumeInformationA
GetPrivateProfileStringA
lstrlenA
advapi32
RegOpenKeyExA
RegDeleteKeyA
RegDeleteValueA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
RegQueryValueExA
msvcrt
fopen
sprintf
malloc
strstr
_strlwr
fclose
Sections
.data Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE