Static task
static1
Behavioral task
behavioral1
Sample
41ce70d1b564e2a3d5f64958c0fec5245d068cd2c90ed9dfdf24a8787502eba7.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
41ce70d1b564e2a3d5f64958c0fec5245d068cd2c90ed9dfdf24a8787502eba7.exe
Resource
win10v2004-20240226-en
General
-
Target
41ce70d1b564e2a3d5f64958c0fec5245d068cd2c90ed9dfdf24a8787502eba7
-
Size
94KB
-
MD5
5bb950709f36d25a146a62e0dce2f62a
-
SHA1
28cebf5e895af262803c60230059be1b50c42d13
-
SHA256
41ce70d1b564e2a3d5f64958c0fec5245d068cd2c90ed9dfdf24a8787502eba7
-
SHA512
4cb74127429e1d4d9c961e3b54216d5305d2955bc8f45bad4130c0db9ebb6bbae1054d9b1af70979f461c685d0e5c811f6978e54378c4cbb9c1fea40e7d014a0
-
SSDEEP
1536:NThD5FrTatdwWuRY7h/KbEK2EEUii5QtlIPA3v1bD:9hl8dFGDEhExijtkQ9b
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 41ce70d1b564e2a3d5f64958c0fec5245d068cd2c90ed9dfdf24a8787502eba7
Files
-
41ce70d1b564e2a3d5f64958c0fec5245d068cd2c90ed9dfdf24a8787502eba7.exe windows:5 windows x86 arch:x86
f64e694edcc89bd089b646e9c543e6f3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
CharUpperW
LoadStringW
wsprintfW
ole32
CoInitializeSecurity
CoCreateInstance
CoTaskMemAlloc
CoTaskMemFree
CoUninitialize
CoInitializeEx
oleaut32
VariantChangeType
VariantCopy
SysStringLen
SysAllocStringByteLen
VariantClear
SysFreeString
SysAllocString
VariantInit
framedyn
?Format@CHString@@QAAXPBGZZ
??0CHString@@QAE@PBG@Z
?Find@CHString@@QBEHPBG@Z
??4CHString@@QAEABV0@ABV0@@Z
?Mid@CHString@@QBE?AV1@H@Z
?Find@CHString@@QBEHG@Z
??0CHString@@QAE@XZ
?ReleaseBuffer@CHString@@QAEXH@Z
?GetBufferSetLength@CHString@@QAEPAGH@Z
?Left@CHString@@QBE?AV1@H@Z
?Compare@CHString@@QBEHPBG@Z
?Mid@CHString@@QBE?AV1@HH@Z
??4CHString@@QAEABV0@PBG@Z
?TrimRight@CHString@@QAEXXZ
?TrimLeft@CHString@@QAEXXZ
?FindOneOf@CHString@@QBEHPBG@Z
??YCHString@@QAEABV0@PBG@Z
?GetData@CHString@@IBEPAUCHStringData@@XZ
??1CHString@@QAE@XZ
secur32
GetUserNameExW
ws2_32
WSAGetLastError
inet_addr
gethostbyaddr
WSACleanup
WSAStartup
msvcrt
??1type_info@@UAE@XZ
_controlfp
?terminate@@YAXXZ
wcslen
wcscpy
_except_handler3
wcsstr
memmove
_itow
__CxxFrameHandler
??2@YAPAXI@Z
_iob
_CxxThrowException
??3@YAXPAX@Z
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__wgetmainargs
__winitenv
exit
_cexit
_XcptFilter
_exit
_c_exit
strtok
wcschr
fprintf
fflush
_wcsnicmp
wcsncmp
wcstol
wcstok
realloc
free
calloc
_wcsicmp
wcstod
kernel32
FreeLibrary
lstrlenW
lstrcmpiW
LocalAlloc
FormatMessageW
SetLastError
lstrcmpW
lstrcatW
InterlockedDecrement
GetConsoleScreenBufferInfo
GetModuleHandleA
GetComputerNameExW
GetTimeFormatW
GetConsoleMode
GetStdHandle
WriteConsoleW
SetConsoleCursorPosition
InterlockedIncrement
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetConsoleMode
ReadFile
ReadConsoleW
MultiByteToWideChar
GetLastError
LocalFree
LoadLibraryW
GetProcAddress
lstrcpyW
WideCharToMultiByte
VerSetConditionMask
VerifyVersionInfoW
FileTimeToSystemTime
lstrcpynW
SetUnhandledExceptionFilter
Sections
.text Size: 58KB - Virtual size: 57KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 208B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 21B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.htext Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE