Static task
static1
Behavioral task
behavioral1
Sample
c9bec4d18423a6365b703cc2ed22b4523b5ee3521acb4bc5a56d7eb36a5a0f8f.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
c9bec4d18423a6365b703cc2ed22b4523b5ee3521acb4bc5a56d7eb36a5a0f8f.exe
Resource
win10v2004-20240508-en
General
-
Target
c9bec4d18423a6365b703cc2ed22b4523b5ee3521acb4bc5a56d7eb36a5a0f8f
-
Size
218KB
-
MD5
fc570ccaf2741120c6d58eee1da3cedd
-
SHA1
e068a1e4f5423b0c9519adfffa5747164d5976a6
-
SHA256
c9bec4d18423a6365b703cc2ed22b4523b5ee3521acb4bc5a56d7eb36a5a0f8f
-
SHA512
a6e12a20ded26551b311a548276ab388ecb729f44e86501b27fed9bc5c87361c1da4810f8180373f7e59676d437d9857686968d38c0aadd8dcb713765f3ff519
-
SSDEEP
6144:xwQe9QVSTYbrD5vt75NUT7ybcZhp0xu4/9N+nW0YO:xwfiuYlvxUZ8NC9YO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c9bec4d18423a6365b703cc2ed22b4523b5ee3521acb4bc5a56d7eb36a5a0f8f
Files
-
c9bec4d18423a6365b703cc2ed22b4523b5ee3521acb4bc5a56d7eb36a5a0f8f.exe windows:4 windows x86 arch:x86
4c56eac93eeb8762f309e2249f925ab7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42
ord3663
ord941
ord6283
ord6282
ord4202
ord2841
ord5450
ord6394
ord2107
ord5440
ord6383
ord617
ord5214
ord296
ord3584
ord3643
ord696
ord543
ord394
ord803
ord5710
ord4129
ord6662
ord6418
ord2393
ord1263
ord6307
ord909
ord4167
ord521
ord5628
ord538
ord4185
ord1166
ord4278
ord5683
ord4204
ord939
ord6223
ord6055
ord4078
ord1776
ord4407
ord2385
ord5163
ord6374
ord4353
ord5290
ord3798
ord4837
ord4441
ord2648
ord2055
ord6376
ord3749
ord5065
ord1727
ord5261
ord2446
ord2124
ord5277
ord4627
ord389
ord567
ord535
ord4275
ord6442
ord1233
ord5241
ord1871
ord1187
ord2919
ord3258
ord1265
ord2233
ord699
ord397
ord5593
ord3438
ord5590
ord912
ord4188
ord6199
ord2827
ord5442
ord5186
ord354
ord536
ord1576
ord3229
ord5204
ord5808
ord6869
ord353
ord3579
ord350
ord3613
ord3126
ord5651
ord3616
ord3127
ord743
ord446
ord3353
ord6143
ord6139
ord6142
ord6140
ord1168
ord6883
ord5857
ord5860
ord5858
ord5608
ord5602
ord5606
ord5603
ord4003
ord4226
ord2730
ord2727
ord6467
ord2729
ord290
ord541
ord287
ord500
ord341
ord614
ord6385
ord1979
ord665
ord690
ord2915
ord5572
ord2763
ord3811
ord2820
ord850
ord1770
ord835
ord548
ord2614
ord2764
ord561
ord3738
ord4424
ord4622
ord4080
ord3079
ord3825
ord3831
ord3830
ord3401
ord2976
ord3081
ord2985
ord3262
ord3136
ord4465
ord3259
ord3147
ord2982
ord5714
ord5289
ord5307
ord4698
ord4079
ord5302
ord5300
ord3346
ord2396
ord5199
ord1089
ord3922
ord5731
ord2512
ord2554
ord4486
ord6375
ord815
ord3742
ord2818
ord801
ord610
ord772
ord654
ord1799
ord924
ord858
ord825
ord540
ord823
ord860
ord800
ord818
ord537
msvcrt
__p__commode
strlen
__CxxFrameHandler
_mbsstr
strcpy
atoi
atol
_setmbcp
memmove
sprintf
rand
_atoi64
free
memset
malloc
_purecall
_mbscmp
_stat
_mkdir
_mbsnbcpy
_mbschr
memcpy
_splitpath
strtoul
__RTDynamicCast
_mbsicmp
time
_beginthreadex
__dllonexit
_onexit
??1type_info@@UAE@XZ
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
_controlfp
_except_handler3
__set_app_type
__p__fmode
memcmp
kernel32
GetModuleHandleA
WaitForMultipleObjects
TerminateThread
SetThreadPriority
WaitForSingleObject
GetLogicalDrives
GetDriveTypeA
GetVolumeInformationA
MoveFileExA
GetShortPathNameA
GetWindowsDirectoryA
lstrcatA
CreateFileMappingA
MapViewOfFile
lstrcpyA
UnmapViewOfFile
CopyFileA
SetFileAttributesA
GetModuleFileNameA
GetTempPathA
CreateProcessA
GetProcAddress
FreeLibrary
LoadLibraryA
GlobalFree
SetFilePointer
SetEndOfFile
GetVersionExA
HeapAlloc
WriteFile
GetProcessHeap
HeapFree
ResetEvent
SetEvent
CreateDirectoryA
GetFileAttributesA
CreateEventA
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
CreateFileA
GetFileSize
CloseHandle
GetComputerNameA
DeleteFileA
GetCommandLineA
CreateMutexA
GetLastError
GetPrivateProfileStringA
WritePrivateProfileSectionA
WritePrivateProfileStringA
lstrlenA
MultiByteToWideChar
GetTempFileNameA
WideCharToMultiByte
lstrlenW
GetStartupInfoA
user32
PeekMessageA
GetDesktopWindow
PostMessageA
wsprintfA
PostThreadMessageA
GetMessageA
TranslateMessage
EnableWindow
DispatchMessageA
advapi32
RegSetValueExA
RegQueryValueExA
RegCloseKey
RegCreateKeyA
RegDeleteValueA
GetUserNameA
RegOpenKeyExA
RegOpenKeyA
shell32
SHGetSpecialFolderPathA
ole32
StgCreateDocfile
StgOpenStorage
CoCreateGuid
CoTaskMemAlloc
CoTaskMemFree
oleaut32
VariantClear
VariantTimeToSystemTime
wininet
InternetErrorDlg
InternetQueryOptionA
InternetSetOptionA
InternetCloseHandle
HttpOpenRequestA
InternetSetStatusCallback
HttpQueryInfoA
HttpSendRequestA
InternetConnectA
HttpAddRequestHeadersA
InternetOpenA
InternetReadFileExA
netapi32
Netbios
version
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
wsock32
htonl
ntohl
Sections
.text Size: 100KB - Virtual size: 96KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 32KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE