Static task
static1
Behavioral task
behavioral1
Sample
c7c57459998303e8c2ebdcab1d918cd5b46d8ca7e0393f9c8e576ee182b2844c.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c7c57459998303e8c2ebdcab1d918cd5b46d8ca7e0393f9c8e576ee182b2844c.exe
Resource
win10v2004-20240802-en
General
-
Target
c7c57459998303e8c2ebdcab1d918cd5b46d8ca7e0393f9c8e576ee182b2844c
-
Size
1006KB
-
MD5
3e00954856cc1dc94cb663aa2ec82812
-
SHA1
4f92f7cb4ad38a43d7c657fa56eb53cc113603f6
-
SHA256
c7c57459998303e8c2ebdcab1d918cd5b46d8ca7e0393f9c8e576ee182b2844c
-
SHA512
ffc4f45332020b9ceed14c0e80cdca2dbc14396607e4b567bbe65118d293e29e7e3507901472813ce49c48fda7ce9dcb4052c07cd0829b64968d1758820ca750
-
SSDEEP
24576:+mE0Hh/J9wl45rfZJXL9x/jtjCl8bVpcGcwUOWRaBXde:rE0Hh/Jm27XLD/BdbVG1OBBXde
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c7c57459998303e8c2ebdcab1d918cd5b46d8ca7e0393f9c8e576ee182b2844c
Files
-
c7c57459998303e8c2ebdcab1d918cd5b46d8ca7e0393f9c8e576ee182b2844c.exe windows:5 windows x86 arch:x86
a06d40e431609b15afb71f6d96c212d3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentDirectoryW
PeekNamedPipe
GetFileInformationByHandle
GetFullPathNameA
FindFirstFileExA
GetDriveTypeA
FileTimeToLocalFileTime
FileTimeToSystemTime
FindClose
SetEnvironmentVariableA
CompareStringW
GetTimeZoneInformation
RaiseException
RtlUnwind
GetLastError
HeapFree
HeapAlloc
DecodePointer
EncodePointer
ReadConsoleInputA
SetConsoleMode
GetConsoleMode
HeapReAlloc
HeapSetInformation
IsProcessorFeaturePresent
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
GetModuleHandleW
SetLastError
GetCurrentThreadId
InterlockedDecrement
GetProcAddress
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
EnterCriticalSection
LeaveCriticalSection
HeapCreate
ExitProcess
GetModuleFileNameW
GetConsoleCP
InitializeCriticalSectionAndSpinCount
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
CreateFileW
DeleteCriticalSection
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapSize
SetConsoleCtrlHandler
FreeLibrary
LoadLibraryW
SetStdHandle
FlushFileBuffers
WriteConsoleW
LCMapStringW
GetStringTypeW
SetEndOfFile
GetProcessHeap
GetModuleHandleA
GetVersion
GlobalMemoryStatus
LoadLibraryA
FlushConsoleInputBuffer
SetFilePointer
WideCharToMultiByte
MultiByteToWideChar
CreateDirectoryA
GetFileAttributesA
Sleep
WriteFile
GetStdHandle
CreateFileA
ReadFile
CloseHandle
GetModuleFileNameA
IsDebuggerPresent
GetCommandLineA
GetDriveTypeW
ws2_32
gethostbyname
htons
socket
setsockopt
ioctlsocket
shutdown
connect
select
recv
send
WSAGetLastError
closesocket
WSAStartup
WSASetLastError
user32
MessageBoxA
GetProcessWindowStation
GetUserObjectInformationW
advapi32
ReportEventA
DeregisterEventSource
RegisterEventSourceA
Sections
.text Size: 738KB - Virtual size: 738KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 202KB - Virtual size: 201KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ