Static task
static1
Behavioral task
behavioral1
Sample
390a1aa0e2ec7ce8c863f64592d0a396a278c7b526f23d41c0e8cba9391ae8a8.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
390a1aa0e2ec7ce8c863f64592d0a396a278c7b526f23d41c0e8cba9391ae8a8.exe
Resource
win10v2004-20240226-en
General
-
Target
390a1aa0e2ec7ce8c863f64592d0a396a278c7b526f23d41c0e8cba9391ae8a8
-
Size
624KB
-
MD5
81e8db024ed58c3ef4bd7e71817d6805
-
SHA1
133f865d18371b324dc55bb11b53d2ac11bf2f5c
-
SHA256
390a1aa0e2ec7ce8c863f64592d0a396a278c7b526f23d41c0e8cba9391ae8a8
-
SHA512
04c3b7199508b3d7f211528d1966e4fe4632ce6df03d9557b08dd2c2ebb0da20d6d537b1566ae73ab0fb1f03454304f78369d6dfbf10cb68f8f1680fa3dfa56c
-
SSDEEP
12288:ulG3OByZATqgLZ+KomyEPts6NzXJEE05V98UZmf:u8+Bw5gLoKoYtLZExMf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 390a1aa0e2ec7ce8c863f64592d0a396a278c7b526f23d41c0e8cba9391ae8a8
Files
-
390a1aa0e2ec7ce8c863f64592d0a396a278c7b526f23d41c0e8cba9391ae8a8.exe windows:4 windows x86 arch:x86
c4f59734f984cf21ed8a9009ec6fc0ed
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTickCount
SetErrorMode
GetShortPathNameA
FindFirstFileA
FindNextFileA
GetLastError
FindClose
GetFileAttributesA
MoveFileA
GetCommandLineA
GetStartupInfoA
CreateProcessA
OpenEventA
CreateEventA
OpenSemaphoreA
ReleaseSemaphore
WaitForSingleObject
CloseHandle
CreateSemaphoreA
SetEvent
GetLogicalDrives
GetDriveTypeA
InitializeCriticalSection
EnterCriticalSection
TerminateThread
CreateThread
LeaveCriticalSection
Sleep
ReadDirectoryChangesW
WideCharToMultiByte
GetModuleFileNameA
GetSystemDirectoryA
GetTempPathA
GetFileSize
SetFilePointer
ReadFile
GetProcAddress
LoadLibraryA
GetCurrentProcessId
GetCurrentThreadId
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
GetSystemTimeAsFileTime
TerminateProcess
InterlockedCompareExchange
InterlockedExchange
msvcr80
fopen
fclose
fwrite
strrchr
strcat_s
_unlock
_encode_pointer
__dllonexit
_lock
_onexit
_decode_pointer
_amsg_exit
__getmainargs
_cexit
_exit
_XcptFilter
exit
__initenv
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_crt_debugger_hook
_except_handler4_common
_invoke_watson
_controlfp_s
fflush
fprintf
strncmp
strcpy_s
strstr
srand
setlocale
??3@YAXPAX@Z
rand
??2@YAPAXI@Z
sprintf_s
_strlwr
memcpy
memset
__CxxFrameHandler3
Sections
.text Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 134KB - Virtual size: 134KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ