Static task
static1
Behavioral task
behavioral1
Sample
cb163b3cb2d922a00b2453c27168cabc5463229245599716da46b68d24d4e7dd.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral2
Sample
cb163b3cb2d922a00b2453c27168cabc5463229245599716da46b68d24d4e7dd.exe
Resource
win11-20240221-en
General
-
Target
cb163b3cb2d922a00b2453c27168cabc5463229245599716da46b68d24d4e7dd
-
Size
316KB
-
MD5
7d6d4dc1c3dfe47dd121e3d5f6c8b70b
-
SHA1
69110129c67c5100558e30f30366cf736dd8dad3
-
SHA256
cb163b3cb2d922a00b2453c27168cabc5463229245599716da46b68d24d4e7dd
-
SHA512
6e75ea9cfa4a397e72e0fce58769b24ad71cd4da35a8c2343c89b3fda01f49f6c17a8e43b2da7c67a9c88a79af865a573500cfbe90903365ac0142c5c81d8bcd
-
SSDEEP
3072:bF9TVkeNMjAdS7h6+Vd9ONty8tqCG1/mTbML1P4kAM8TMG+fKbtdB:x95st44d9Ut5tRAL1ZAMwn+CzB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource cb163b3cb2d922a00b2453c27168cabc5463229245599716da46b68d24d4e7dd
Files
-
cb163b3cb2d922a00b2453c27168cabc5463229245599716da46b68d24d4e7dd.exe windows:4 windows x86 arch:x86
43165bf5d0dde5de339704ad9d0b825a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
MultiByteToWideChar
GetProcAddress
LoadLibraryA
GetModuleFileNameA
CreateMutexA
CreateProcessA
CloseHandle
WideCharToMultiByte
WriteFile
ReadFile
FlushFileBuffers
GetSystemTime
GetFileTime
GetLastError
SystemTimeToFileTime
CreateFileA
GetTempPathA
WinExec
ExitProcess
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
InitializeCriticalSection
HeapFree
HeapAlloc
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCommandLineA
GetVersionExA
GetProcessHeap
GetStartupInfoA
RaiseException
RtlUnwind
HeapDestroy
HeapCreate
VirtualFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
HeapReAlloc
GetModuleHandleA
GetStdHandle
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
Sleep
HeapSize
SetFilePointer
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
GetOEMCP
advapi32
RegCloseKey
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegCreateKeyExA
shell32
SHGetSpecialFolderPathA
shlwapi
PathFileExistsA
crypt32
CryptStringToBinaryA
CertOpenStore
CertFreeCertificateContext
CertAddCertificateContextToStore
CertCloseStore
CertCreateCertificateContext
CertGetCertificateContextProperty
winhttp
WinHttpQueryHeaders
WinHttpCloseHandle
WinHttpConnect
WinHttpQueryDataAvailable
WinHttpOpenRequest
WinHttpSetTimeouts
WinHttpReceiveResponse
WinHttpQueryOption
WinHttpOpen
WinHttpAddRequestHeaders
WinHttpSetOption
WinHttpReadData
WinHttpSendRequest
Sections
.text Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 248KB - Virtual size: 244KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 600B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ