Static task
static1
Behavioral task
behavioral1
Sample
9a5623a11426cab6eb3f0c956032e54c1ff05031338a68808eeaa0b5de250a51.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9a5623a11426cab6eb3f0c956032e54c1ff05031338a68808eeaa0b5de250a51.exe
Resource
win10v2004-20240226-en
General
-
Target
9a5623a11426cab6eb3f0c956032e54c1ff05031338a68808eeaa0b5de250a51
-
Size
28KB
-
MD5
241475899a89040c41ab9ca28c116f06
-
SHA1
d35a85ba02f7a7ec5bf5146770c49110453ad245
-
SHA256
9a5623a11426cab6eb3f0c956032e54c1ff05031338a68808eeaa0b5de250a51
-
SHA512
469dc485d1328d12cc42b60b974cf4eac96af35e0b62b92fc9e437891d1f705d074fc26c3c9d888a2da4e1605bfc69309e3d581e60b10a1517acdcafc5155d13
-
SSDEEP
384:uQtvTi43TYcLS/yz13eDpMNmhJLaMoHMl664IT:fvF5D13eDp0mhZvoH3VIT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 9a5623a11426cab6eb3f0c956032e54c1ff05031338a68808eeaa0b5de250a51
Files
-
9a5623a11426cab6eb3f0c956032e54c1ff05031338a68808eeaa0b5de250a51.exe windows:4 windows x86 arch:x86
31a470fe8906ab8b2aa974ed06d64c78
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrlenA
MultiByteToWideChar
lstrlenW
WideCharToMultiByte
GetTempPathA
DeleteFileA
CreateProcessA
WaitForSingleObject
GetLastError
SetEvent
GetModuleFileNameA
CreateEventA
GetModuleHandleA
user32
UpdateWindow
ShowWindow
CreateWindowExA
RegisterClassA
GetMessageA
LoadIconA
PostQuitMessage
DefWindowProcA
PostMessageA
TranslateMessage
LoadCursorA
DispatchMessageA
gdi32
GetStockObject
advapi32
RegSetValueExA
RegCloseKey
RegQueryValueExA
RegCreateKeyExA
RegOpenKeyExA
RegDeleteKeyA
ole32
CoTaskMemFree
CoTaskMemAlloc
CoCreateInstance
CoUninitialize
CoInitialize
CLSIDFromProgID
oleaut32
VariantClear
SysAllocString
msvcp60
?open@?$basic_filebuf@DU?$char_traits@D@std@@@std@@QAEPAV12@PBDH@Z
??_7?$basic_ofstream@DU?$char_traits@D@std@@@std@@6B@
?_Init@?$basic_filebuf@DU?$char_traits@D@std@@@std@@IAEXPAU_iobuf@@W4_Initfl@12@@Z
??_7?$basic_filebuf@DU?$char_traits@D@std@@@std@@6B@
??0locale@std@@QAE@XZ
??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IAE@XZ
??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QAE@PAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N1@Z
??0ios_base@std@@IAE@XZ
??_8?$basic_ofstream@DU?$char_traits@D@std@@@std@@7B@
??_7?$basic_ios@DU?$char_traits@D@std@@@std@@6B@
?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QAEXH_N@Z
?write@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV12@PBDH@Z
?clear@?$basic_ios@DU?$char_traits@D@std@@@std@@QAEXH_N@Z
??1?$basic_filebuf@DU?$char_traits@D@std@@@std@@UAE@XZ
??_7?$basic_ostream@DU?$char_traits@D@std@@@std@@6B@
??1ios_base@std@@UAE@XZ
??1?$basic_ios@DU?$char_traits@D@std@@@std@@UAE@XZ
??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UAE@XZ
??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UAE@XZ
??1locale@std@@QAE@XZ
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?_Xlen@std@@YAXXZ
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??_D?$basic_ofstream@DU?$char_traits@D@std@@@std@@QAEXXZ
msvcrt
strncpy
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
__p___initenv
exit
_XcptFilter
_exit
??1type_info@@UAE@XZ
_onexit
__dllonexit
free
strrchr
strchr
_mbsnbcmp
_mbsnbcpy
_mbscmp
??2@YAPAXI@Z
sprintf
__CxxFrameHandler
_beginthreadex
fclose
_controlfp
strstr
_vsnprintf
_CxxThrowException
atol
Sections
.text Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE