Static task
static1
Behavioral task
behavioral1
Sample
c76f035f5192e3a7bbb2a3d38b39ae9a9fab12673845136a8ec4170ba5a8bd6f.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
c76f035f5192e3a7bbb2a3d38b39ae9a9fab12673845136a8ec4170ba5a8bd6f.exe
Resource
win10v2004-20240611-en
General
-
Target
c76f035f5192e3a7bbb2a3d38b39ae9a9fab12673845136a8ec4170ba5a8bd6f
-
Size
9.9MB
-
MD5
a3c707e116a3001ea6493f56c0eafbf5
-
SHA1
e28cd6224720832f9796d8b51833b14e86513a95
-
SHA256
c76f035f5192e3a7bbb2a3d38b39ae9a9fab12673845136a8ec4170ba5a8bd6f
-
SHA512
3c6ee7d0d3e4a65d57f2d7c6bbd6a28f1d0bfa7e375ff777203b6433450b204fbe4138eb97681bb38dd6206e0ac7c79a6db0e43daf78576f0df11f75aebaac84
-
SSDEEP
196608:rTvIgT4sSFVrjdxcsjNW5TT58HQGwVtdeQzQ:XvIk4sQcwmqwVtdRz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c76f035f5192e3a7bbb2a3d38b39ae9a9fab12673845136a8ec4170ba5a8bd6f
Files
-
c76f035f5192e3a7bbb2a3d38b39ae9a9fab12673845136a8ec4170ba5a8bd6f.exe windows:4 windows x86 arch:x86
ffcb3c7a645bf412ce7ea0928b9f1612
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LocalFree
GlobalUnlock
LocalLock
GlobalAlloc
DeviceIoControl
ReleaseSemaphore
WaitForSingleObject
CreateSemaphoreA
lstrcpyA
lstrcpynA
GetDiskFreeSpaceA
SetErrorMode
GetDriveTypeA
GetLogicalDriveStringsA
WriteFile
ReadFile
GetFileSize
GetSystemDirectoryA
GetModuleFileNameA
FindClose
FindFirstFileA
GetCurrentProcessId
GetSystemTime
GetLocalTime
TerminateProcess
OpenProcess
SetFilePointer
GetTickCount
SizeofResource
LockResource
LoadResource
FindResourceA
GetVersion
CreateProcessA
GetTempPathA
lstrcatA
LoadLibraryExA
CreateFileA
lstrlenA
CloseHandle
GetLastError
IsBadReadPtr
GetSystemInfo
VirtualAlloc
GetCurrentProcess
VirtualProtect
FreeLibrary
VirtualProtectEx
GetModuleHandleA
LoadLibraryA
GetProcAddress
GetPrivateProfileStringA
GetVersionExA
QueryPerformanceCounter
GlobalMemoryStatus
VirtualFree
GetStdHandle
GetFileType
GetCurrentThreadId
user32
GetUserObjectInformationW
GetProcessWindowStation
wsprintfA
LoadCursorA
SetCursor
MessageBoxA
GetDesktopWindow
advapi32
ReportEventA
DeregisterEventSource
RegEnumKeyExA
RegCloseKey
RegOpenKeyExA
RegisterEventSourceA
netapi32
Netbios
msvcrt
_strnicmp
free
malloc
_except_handler3
atol
rand
srand
strcat
strrchr
localtime
mktime
strcpy
exit
fputc
calloc
fgetc
_ltoa
_stricmp
_pctype
__mb_cur_max
_isctype
realloc
memchr
fwrite
fflush
_setmode
ftell
fseek
fgets
abort
wcsstr
_vsnprintf
vfprintf
_iob
qsort
fprintf
_exit
_XcptFilter
__p___initenv
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
strlen
fopen
fread
memcmp
time
__CxxFrameHandler
memmove
memset
strcmp
??2@YAPAXI@Z
??3@YAXPAX@Z
memcpy
fclose
_fileno
Sections
.text Size: 272KB - Virtual size: 271KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 64KB - Virtual size: 62KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 860KB - Virtual size: 874KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8.7MB - Virtual size: 8.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE