Static task
static1
Behavioral task
behavioral1
Sample
c32ed43620f3890519640bf7b4ad3ec0N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
c32ed43620f3890519640bf7b4ad3ec0N.exe
Resource
win10v2004-20240709-en
General
-
Target
c32ed43620f3890519640bf7b4ad3ec0N.exe
-
Size
220KB
-
MD5
c32ed43620f3890519640bf7b4ad3ec0
-
SHA1
0cddd222563866280f02647d30790ba89b8c5da0
-
SHA256
3f11f354d5dc75cb340488e4f95a3417e41fe3747cd2719377e795e3e679a5f5
-
SHA512
d0f08a88bff0fc798d1eb96c0355f4d78e39f3034586ee67d5364a041e3e0cfe982893c64303fd7853fa46f426ee9bdb22901a4729fc1b9f91e319c341100a85
-
SSDEEP
1536:69t54HgHhnsBnzWLfSKNeMjC/EO7nXSe0chhP7AGMuhO9LniHj4VUMdmn9R:6z57SYeMW/EO7X90e57bC9OjAUM69
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c32ed43620f3890519640bf7b4ad3ec0N.exe
Files
-
c32ed43620f3890519640bf7b4ad3ec0N.exe.exe windows:1 windows x86 arch:x86
9cc34d364e8f0715ee15ba0f0f2ea28d
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
GetUserNameA
RegEnumValueA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
kernel32
CreateThread
CopyFileA
CreateFileMappingA
CreateMutexA
DeleteFileA
CreateProcessA
CreateFileA
EnumResourceNamesA
FileTimeToDosDateTime
FileTimeToLocalFileTime
FindNextFileA
FindFirstFileA
FindResourceA
CloseHandle
FreeLibrary
FindClose
GetCommandLineA
GetCurrentProcessId
GetComputerNameA
GetDriveTypeA
GetFileAttributesA
GetEnvironmentStrings
GetFileType
GetFileSize
GetLocalTime
GetFileTime
GetLastError
GetModuleFileNameA
GetPrivateProfileIntA
GetModuleHandleA
GetPrivateProfileStringA
GetProcAddress
GetSystemDirectoryA
GetConsoleScreenBufferInfo
GetTempPathA
GetTickCount
GetStdHandle
GetVersionExA
GetWindowsDirectoryA
GlobalAlloc
LoadLibraryA
GlobalReAlloc
GlobalFree
GlobalUnlock
GetVolumeInformationA
LoadLibraryExA
LoadResource
GlobalLock
MapViewOfFile
LockResource
MoveFileA
OpenFile
OpenMutexA
RaiseException
GlobalHandle
ReadFile
ReleaseMutex
SizeofResource
SetFileAttributesA
SetFilePointer
SetFileTime
SetThreadPriority
ExitProcess
TlsGetValue
TlsAlloc
Sleep
TlsSetValue
WaitForSingleObject
WriteFile
VirtualAlloc
VirtualFree
_lread
_llseek
_lopen
WritePrivateProfileStringA
_lclose
_lcreat
SetErrorMode
SetEndOfFile
RtlUnwind
_lwrite
user32
CharUpperA
GetMessageA
CharToOemA
DefWindowProcA
CreateWindowExA
DispatchMessageA
FindWindowA
GetKeyNameTextA
GetWindowTextA
KillTimer
OemToCharA
OemToCharA
MessageBoxA
RegisterClassA
PostMessageA
PostQuitMessage
SetTimer
SendMessageA
TranslateMessage
ShowWindow
SetWindowTextA
SetWindowsHookExA
UpdateWindow
UnhookWindowsHookEx
wsock32
inet_addr
recv
htons
closesocket
connect
WSAStartup
WSACleanup
gethostbyname
send
socket
Sections
1 Size: 124KB - Virtual size: 124KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
2 1 Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
3 2 Size: 84KB - Virtual size: 84KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE