Static task
static1
Behavioral task
behavioral1
Sample
2438ce1620681d86da8bdec8f2a79c8d45f28b1e466e7643c6a823c0c317597f.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2438ce1620681d86da8bdec8f2a79c8d45f28b1e466e7643c6a823c0c317597f.exe
Resource
win10v2004-20240704-en
General
-
Target
2438ce1620681d86da8bdec8f2a79c8d45f28b1e466e7643c6a823c0c317597f.exe
-
Size
132KB
-
MD5
5966476a24b622ad8998071e6a44e960
-
SHA1
04f20fbab54c3b0646ee0fbc6bf479eeb1abf171
-
SHA256
2438ce1620681d86da8bdec8f2a79c8d45f28b1e466e7643c6a823c0c317597f
-
SHA512
81b087b89254f1179d9706fffb1850564d56aab0eebbd2c68b1dfdd9cf431bb67301f990302083d1ee1d932b2c4e401079e1cc0a59692ab3883f7cb16b71df95
-
SSDEEP
3072:svfE7aipKHFGlil5e4pUI0yRFZ4YF2HJuddpFnPRVAEXvS:sHE79P4NXPZ4YTd7FnP86S
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2438ce1620681d86da8bdec8f2a79c8d45f28b1e466e7643c6a823c0c317597f.exe
Files
-
2438ce1620681d86da8bdec8f2a79c8d45f28b1e466e7643c6a823c0c317597f.exe.exe windows:4 windows x86 arch:x86
b5949130a716fe511f46fc905a62c5d2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindFirstFileA
WaitForMultipleObjects
RemoveDirectoryA
DeleteFileA
SetFileAttributesA
MultiByteToWideChar
GetCurrentDirectoryA
TerminateProcess
ReadFile
LocalAlloc
Process32Next
Process32First
CreateToolhelp32Snapshot
CreateFileMappingA
GetLastError
Module32Next
Module32First
GetCurrentThreadId
FormatMessageA
FindClose
LocalFree
GetDriveTypeA
GetLogicalDrives
GetDiskFreeSpaceExA
GlobalMemoryStatusEx
GetSystemDirectoryA
lstrcmpiA
GetUserDefaultLangID
VirtualProtectEx
WriteProcessMemory
GetModuleHandleA
GetModuleFileNameA
DeleteCriticalSection
GetCurrentProcess
MapViewOfFile
GetCurrentProcessId
DuplicateHandle
DeviceIoControl
UnmapViewOfFile
GetSystemInfo
ReadProcessMemory
VirtualQueryEx
QueryPerformanceCounter
OpenProcess
QueryPerformanceFrequency
FindNextFileA
LoadLibraryA
GetProcAddress
FreeLibrary
GetProcessHeap
HeapAlloc
WideCharToMultiByte
HeapFree
CreateEventA
GetLocalTime
CreateFileA
SetFilePointer
WriteFile
GetVersionExA
CreateSemaphoreA
CreateThread
CloseHandle
SetEvent
EnterCriticalSection
LeaveCriticalSection
WaitForSingleObject
ReleaseSemaphore
Sleep
GetTickCount
SetConsoleTitleA
SetConsoleCtrlHandler
InitializeCriticalSection
GetFileSize
user32
SetProcessWindowStation
SetThreadDesktop
CloseDesktop
GetUserObjectSecurity
SetUserObjectSecurity
SendMessageA
EnumChildWindows
GetForegroundWindow
LoadIconA
LoadCursorA
RegisterClassA
CreateWindowExA
DefWindowProcA
GetMessageA
TranslateMessage
DispatchMessageA
EnumDisplaySettingsA
PostMessageA
wsprintfA
GetProcessWindowStation
ExitWindowsEx
GetThreadDesktop
CloseWindowStation
gdi32
GetStockObject
advapi32
GetSecurityDescriptorDacl
OpenEventLogA
ClearEventLogA
CloseEventLog
RegEnumValueA
GetNamedSecurityInfoA
SetNamedSecurityInfoA
BuildExplicitAccessWithNameA
SetEntriesInAclA
RegEnumKeyA
RegSetValueExA
OpenSCManagerA
OpenServiceA
CloseServiceHandle
LookupPrivilegeValueA
AdjustTokenPrivileges
GetSidIdentifierAuthority
GetSidSubAuthorityCount
GetSidSubAuthority
AllocateAndInitializeSid
EqualSid
LookupAccountSidA
OpenProcessToken
GetTokenInformation
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
StartServiceA
QueryServiceStatus
IsValidSecurityDescriptor
RegDeleteKeyA
CreateServiceA
RegCreateKeyExA
ChangeServiceConfigA
DeleteService
EnumServicesStatusA
LookupAccountNameA
SetSecurityDescriptorDacl
MakeAbsoluteSD
SetTokenInformation
AllocateLocallyUniqueId
ImpersonateLoggedOnUser
DuplicateTokenEx
CreateProcessAsUserA
ControlService
shell32
SHGetSpecialFolderLocation
SHGetPathFromIDListA
odbc32
ord41
ord39
ord75
ord24
ord9
ord31
ws2_32
recv
ntohs
inet_addr
ntohl
gethostname
gethostbyname
closesocket
WSACleanup
WSAIoctl
WSARecv
WSASend
WSAAccept
WSASocketA
listen
WSAAsyncSelect
send
inet_ntoa
ioctlsocket
connect
WSAGetLastError
select
__WSAFDIsSet
WSAStartup
setsockopt
htonl
sendto
socket
htons
bind
wininet
InternetWriteFile
HttpQueryInfoA
HttpSendRequestA
HttpOpenRequestA
InternetCrackUrlA
InternetReadFile
InternetConnectA
InternetOpenA
FtpSetCurrentDirectoryA
FtpGetCurrentDirectoryA
FtpOpenFileA
FtpCommandA
InternetGetLastResponseInfoA
FtpFindFirstFileA
InternetFindNextFileA
InternetCloseHandle
wtsapi32
WTSQuerySessionInformationA
WTSEnumerateSessionsA
WTSFreeMemory
netapi32
NetUserSetInfo
NetUserGetLocalGroups
NetShareEnum
NetWkstaGetInfo
NetServerGetInfo
NetUserEnum
NetApiBufferFree
NetUserGetInfo
NetUserDel
iphlpapi
SetTcpEntry
imagehlp
MapAndLoad
ImageRvaToVa
UnMapAndLoad
msvcrt
_stricmp
atoi
printf
sprintf
strncpy
free
strtok
strstr
rand
_snprintf
malloc
wcscpy
mbstowcs
_wcsicmp
wcslen
atol
strncmp
_ftol
_ultoa
ctime
fprintf
_iob
sscanf
toupper
fflush
_exit
_XcptFilter
exit
__p___initenv
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_getch
_strupr
_strcmpi
_strnicmp
_controlfp
_except_handler3
Sections
.text Size: 88KB - Virtual size: 84KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 32KB - Virtual size: 158KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE