Static task
static1
Behavioral task
behavioral1
Sample
cdf36a3edf211389b98b93d08d21d5b7.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cdf36a3edf211389b98b93d08d21d5b7.exe
Resource
win10v2004-20240226-en
General
-
Target
cdf36a3edf211389b98b93d08d21d5b7
-
Size
119KB
-
MD5
cdf36a3edf211389b98b93d08d21d5b7
-
SHA1
ce759c269be948cb9fd0ee76c4eefe56209cbd92
-
SHA256
e323def5cd973b5a9dd0ad05671ade970d39e0239bb878793b6396e238fc2197
-
SHA512
4d10f981674dccaa2279cc9aa2326f24f758693b79c269a364f9630cd590712c0b512fa0f8519c4e989002f349106a2f7ceeffe6b5b1820234036c2f8a581b2b
-
SSDEEP
1536:Nvap6J9FJmGcyQ/hwIPvEJ+abpg39FpP3gQV32JbJBKAD7ZX:BVhoGctw+S8pPZMZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource cdf36a3edf211389b98b93d08d21d5b7
Files
-
cdf36a3edf211389b98b93d08d21d5b7.exe windows:4 windows x86 arch:x86
0f997822e50b9fbeb1605b1a68f58be1
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
atl
ord15
ord43
ord44
ord45
ord32
ord16
ord21
ord18
ord22
ntdll
RtlCreateUnicodeString
RtlFreeUnicodeString
kernel32
ResetEvent
GetCurrentThreadId
InitializeCriticalSection
GetSystemWindowsDirectoryW
GetVersion
GetFileAttributesW
GetProcAddress
WaitForSingleObject
SetEvent
GetModuleHandleW
LoadLibraryW
GetModuleHandleA
GlobalSize
CreateEventW
DeleteCriticalSection
CloseHandle
InterlockedExchange
InterlockedCompareExchange
QueryPerformanceCounter
GlobalAlloc
GlobalFree
FlushInstructionCache
GetCurrentProcess
InterlockedIncrement
InterlockedDecrement
lstrlenW
EnterCriticalSection
LeaveCriticalSection
GetLastError
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
GetModuleFileNameW
OutputDebugStringA
GetTickCount
GlobalUnlock
GlobalLock
Sleep
LocalFree
LocalAlloc
MultiByteToWideChar
FindClose
FindFirstFileW
FormatMessageW
CompareStringW
GetCommandLineW
GetFullPathNameW
ExpandEnvironmentStringsW
GetProcessHeap
HeapFree
HeapAlloc
LoadLibraryA
VirtualAlloc
CreateActCtxW
ReleaseActCtx
ActivateActCtx
DeactivateActCtx
VirtualFree
oleaut32
SysStringLen
SysAllocString
SafeArrayGetVartype
VariantClear
VariantInit
VariantChangeType
SafeArrayGetElement
SafeArrayGetUBound
SafeArrayGetLBound
SysAllocStringLen
SafeArrayUnaccessData
SafeArrayAccessData
SysFreeString
SafeArrayGetDim
ole32
CoInitialize
CoUninitialize
ReleaseStgMedium
CoCreateInstance
StringFromCLSID
CoTaskMemFree
CoTaskMemAlloc
CreateStreamOnHGlobal
StringFromGUID2
shlwapi
PathFindFileNameW
PathAddBackslashW
PathRemoveFileSpecW
PathStripPathW
secur32
TranslateNameW
ntdsapi
DsCrackNamesW
DsFreeNameResultW
activeds
ord13
ord9
Sections
.text Size: 65KB - Virtual size: 80KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.cbss Size: - Virtual size: 168KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DATA Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.ctls Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.msshare Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.mstp Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 228B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ