Static task
static1
Behavioral task
behavioral1
Sample
ca1da36b8a80c90e2d4835700fc33929a50cadec192c8c07d02d172553a45aed.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
ca1da36b8a80c90e2d4835700fc33929a50cadec192c8c07d02d172553a45aed.exe
Resource
win10v2004-20240611-en
General
-
Target
ca1da36b8a80c90e2d4835700fc33929a50cadec192c8c07d02d172553a45aed
-
Size
140KB
-
MD5
a09063d13a976d96701133dd8a3e8d44
-
SHA1
d637320deaf7f13113bb0ad83f46cedd945d379c
-
SHA256
ca1da36b8a80c90e2d4835700fc33929a50cadec192c8c07d02d172553a45aed
-
SHA512
b68c3ca6b0a642531bfe99ed0744499513469f715eaa12c19f6d6b93a31334a48b729c3a036474ed6a1073e0a7922f749ffafbfee8d241aafa3e199e38040975
-
SSDEEP
384:H+sW5mhmMH3vztK5nm54cuuSoQSCnmbBE59/fnnKtPYKDpcc2e/md0Rq77qUTYxL:H+sj1ghJuSqkmbBE59HnIcld5cxXPj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ca1da36b8a80c90e2d4835700fc33929a50cadec192c8c07d02d172553a45aed
Files
-
ca1da36b8a80c90e2d4835700fc33929a50cadec192c8c07d02d172553a45aed.exe windows:4 windows x86 arch:x86
182a4f3f97a388ffe4a073bf0463eff3
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42d
ord4239
ord4215
ord4408
ord2340
ord2481
ord2584
ord3691
ord2473
ord2585
ord2341
ord2432
ord2339
ord3143
ord3144
ord3142
ord2431
ord3367
ord3784
ord3657
ord2021
ord1285
ord4492
ord2986
ord528
ord728
ord706
ord730
ord5065
ord567
ord4228
ord4143
ord308
ord996
ord468
ord719
ord3446
ord4820
ord2052
ord1320
ord4951
ord3365
ord2154
ord1136
ord4195
ord3629
ord3948
ord4017
ord3831
ord1862
ord4753
ord3362
ord1364
ord3651
ord4176
ord1781
ord4118
ord5076
ord3618
ord4208
ord2078
ord1310
ord3069
ord3944
ord3670
ord2076
ord1566
ord5078
ord3002
ord4064
ord1344
ord4191
ord1830
ord1631
ord4205
ord3786
ord3658
ord1952
ord1228
ord2875
ord574
ord1179
ord317
ord1857
ord3524
ord2104
ord1401
ord3527
ord3825
ord2411
ord2415
ord5058
ord1858
ord1876
ord4178
ord1350
ord4304
ord2484
ord4387
ord3656
ord3950
ord1797
ord3636
ord2753
ord2509
ord4749
ord3373
ord4785
ord4901
ord3785
ord3660
ord684
ord582
ord736
ord492
ord328
ord3938
ord4934
ord1168
ord4256
ord1175
ord1135
ord1041
ord2483
ord4499
ord3382
ord2730
ord2550
ord1232
ord1956
ord4000
ord3778
ord3777
ord1406
ord3528
ord1798
ord4058
ord3997
ord3998
ord3787
ord3758
ord3977
ord4068
ord3611
ord3616
ord3836
ord3967
ord3729
ord3826
ord3738
ord3726
ord3728
ord3725
ord4004
ord4002
ord3379
ord4756
ord1365
ord4175
ord4216
ord3001
ord1340
ord3664
ord4487
ord336
ord587
ord4182
ord1042
ord3971
ord3626
ord3756
ord1235
ord1959
ord3369
ord4653
ord3405
ord2463
ord3587
ord4932
ord2324
ord4984
ord1839
ord4632
ord721
ord1096
ord2434
ord2513
ord4433
ord3170
ord877
ord454
ord2790
ord3173
ord714
ord2292
ord2517
ord3065
ord1417
ord3530
ord2103
ord1784
ord2412
ord4078
ord4081
ord3575
ord2679
ord4021
ord973
ord4279
ord2717
ord2223
ord2222
ord3429
ord3361
ord4174
ord4210
ord2077
ord1309
ord3666
ord3661
ord681
ord679
ord599
ord516
ord479
ord477
ord354
ord697
ord1855
ord2055
ord2054
ord4548
ord2269
ord4689
ord1624
ord3450
ord1627
ord3685
ord1150
ord3432
ord1087
ord4183
ord1239
ord1969
ord4384
ord4837
ord2783
ord5082
ord5080
ord1731
ord4952
ord1426
ord1918
ord3757
ord3978
ord3627
ord3972
ord3970
ord3647
ord1343
ord4184
ord2652
ord383
ord704
ord3532
ord2448
ord1226
ord1950
ord2995
ord2474
ord4888
ord4475
ord3563
ord3281
ord3689
ord3716
ord4720
ord4705
ord4592
ord3286
ord1790
ord4959
ord2597
ord3867
ord3990
ord632
ord5011
ord3068
ord3436
ord398
ord2593
ord880
ord3483
ord487
ord1190
ord3366
ord4229
ord4227
ord2661
ord1789
ord4130
ord1033
ord3231
ord4415
ord1860
ord1880
ord3702
ord5077
ord3552
ord3774
ord3776
ord3739
ord3779
ord1100
msvcrtd
_except_handler3
_controlfp
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
_XcptFilter
_exit
_onexit
__dllonexit
strcmp
exit
strncpy
strchr
_beginthreadex
sprintf
strlen
__CxxFrameHandler
_setmbcp
__set_app_type
kernel32
GetLastError
CloseHandle
LocalFree
LocalAlloc
GetLocalTime
WaitForSingleObject
SetEvent
MapViewOfFile
CreateFileMappingA
CreateEventA
Process32Next
OpenProcess
Process32First
CreateToolhelp32Snapshot
GetModuleHandleA
GetStartupInfoA
CreateMutexA
user32
DestroyWindow
SetWindowPos
SetWindowLongA
SetWindowTextA
CreateWindowExA
GetClassInfoA
wsprintfA
MessageBoxA
SendMessageA
wvsprintfA
FindWindowA
Sections
.text Size: 92KB - Virtual size: 90KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ