Static task
static1
Behavioral task
behavioral1
Sample
31b05310aec68e4ab9f0d72c9f2cdfe208ac774734b7da8fd072293ae1ff8d2b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
31b05310aec68e4ab9f0d72c9f2cdfe208ac774734b7da8fd072293ae1ff8d2b.exe
Resource
win10v2004-20240319-en
General
-
Target
31b05310aec68e4ab9f0d72c9f2cdfe208ac774734b7da8fd072293ae1ff8d2b
-
Size
57KB
-
MD5
0eed8b469218e8a755230021902aa4b9
-
SHA1
4f9ca034a5fa6bc2e76086aa4a3bba7bb884f43a
-
SHA256
31b05310aec68e4ab9f0d72c9f2cdfe208ac774734b7da8fd072293ae1ff8d2b
-
SHA512
1c0c9ef5adf83689e4fc84e72f9c3831926d239ac5e429bcbdebceb5e1c0478343a8bbe6f61db19e093698a0677cd2426d6857694a5800124192f483b0bea58d
-
SSDEEP
768:5hm8WGd6NF5J++xbWLDrUtK8Fh+jRoR7RTUe5UR0qika3UQ3:5hXIxJ+wWz27j+NoRt/5U4kju
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 31b05310aec68e4ab9f0d72c9f2cdfe208ac774734b7da8fd072293ae1ff8d2b
Files
-
31b05310aec68e4ab9f0d72c9f2cdfe208ac774734b7da8fd072293ae1ff8d2b.exe windows:5 windows x86 arch:x86
6aeaa6819769637f6afc491fcf3189a5
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
user32
MessageBoxA
kernel32
Sleep
VirtualFree
VirtualAlloc
VirtualQuery
GetSystemInfo
GetVersion
SetThreadLocale
WideCharToMultiByte
MultiByteToWideChar
GetACP
GetStartupInfoW
GetProcAddress
GetModuleHandleW
GetModuleFileNameW
GetCommandLineW
FreeLibrary
UnhandledExceptionFilter
RtlUnwind
RaiseException
ExitProcess
GetCurrentThreadId
CreateThread
DeleteCriticalSection
InitializeCriticalSection
SetCurrentDirectoryW
GetCurrentDirectoryW
WriteFile
GetStdHandle
CloseHandle
GetProcAddress
RaiseException
LoadLibraryA
GetLastError
TlsSetValue
TlsGetValue
LocalFree
LocalAlloc
GetModuleHandleW
FreeLibrary
WriteFile
VirtualProtect
VirtualFree
VirtualAlloc
Sleep
SizeofResource
ReadFile
OutputDebugStringW
LockResource
LoadResource
LoadLibraryW
IsBadReadPtr
HeapFree
HeapAlloc
GetWindowsDirectoryW
GetVersionExW
GetProcessHeap
GetProcAddress
GetLocalTime
GetLastError
GetFileSize
GetComputerNameW
FreeLibrary
FindResourceW
ExitProcess
CreateThread
CreateMutexW
CreateFileW
CopyFileW
CloseHandle
advapi32
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegNotifyChangeKeyValue
RegDeleteValueW
RegCreateKeyW
RegCloseKey
wininet
InternetReadFile
InternetQueryDataAvailable
InternetOpenUrlW
InternetOpenW
InternetConnectW
InternetCloseHandle
HttpSendRequestA
HttpOpenRequestW
shfolder
SHGetFolderPathW
shell32
ShellExecuteW
ole32
CoTaskMemFree
StringFromCLSID
CoCreateGuid
Sections
.text Size: 41KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.itext Size: 512B - Virtual size: 300B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 10KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 8B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ