Static task
static1
Behavioral task
behavioral1
Sample
0c179cccb7ffb0e313a05d95db9832f16b2aed94fab8a34d70bbb8fc2d7f69dfN.exe
Resource
win7-20240903-en
General
-
Target
0c179cccb7ffb0e313a05d95db9832f16b2aed94fab8a34d70bbb8fc2d7f69dfN
-
Size
101KB
-
MD5
fca81766362b660c11dd057530d2b970
-
SHA1
f6d8e4a544ab5f98a30cdf7ab227900d13b4e02f
-
SHA256
0c179cccb7ffb0e313a05d95db9832f16b2aed94fab8a34d70bbb8fc2d7f69df
-
SHA512
0a8aefb70122332efa41809fed1e7de5e792cd7e289aee6f037de784f2f7d3057506fb929fff09714b9362f2de3afbb31af75b28f02e1fd08b6e5fdfc4acf4e6
-
SSDEEP
3072:8D6u2CwLPO9vFg5rken1P6fzRGmsPu9ZgCO4Plts:02Xa9vFgdhSfzRXsPkZgCOSlts
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0c179cccb7ffb0e313a05d95db9832f16b2aed94fab8a34d70bbb8fc2d7f69dfN
Files
-
0c179cccb7ffb0e313a05d95db9832f16b2aed94fab8a34d70bbb8fc2d7f69dfN.exe windows:4 windows x86 arch:x86
5d93c980cc5e5613f5a385e38f0e819e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
closesocket
recv
select
socket
htons
send
ioctlsocket
gethostbyname
inet_addr
sendto
getsockname
connect
WSAStartup
WSACleanup
urlmon
URLDownloadToFileA
kernel32
FindFirstFileA
LocalFree
GetStartupInfoA
GetLogicalDriveStringsA
GetDriveTypeA
CreateDirectoryA
CreateFileA
WriteFile
CloseHandle
ReadProcessMemory
OpenProcess
Module32Next
DeleteFileA
Sleep
TerminateProcess
SetFileAttributesA
Module32First
CreateToolhelp32Snapshot
Process32Next
Process32First
GetModuleFileNameA
GetModuleHandleA
CreateRemoteThread
WriteProcessMemory
VirtualAllocEx
VirtualAlloc
CreateProcessA
ExpandEnvironmentStringsA
FreeLibrary
lstrcpyA
GetProcAddress
lstrlenA
lstrcatA
FindClose
LoadLibraryA
GetLastError
CopyFileA
GetFileAttributesA
lstrcmpiA
GetWindowsDirectoryA
CreateThread
ExitProcess
GetLocaleInfoA
GetTempPathA
GetTickCount
ExitThread
GlobalUnlock
GlobalLock
GlobalAlloc
CreateMutexA
SetErrorMode
GetCurrentProcess
GetVersionExA
TerminateThread
WaitForSingleObject
shell32
ShellExecuteA
advapi32
RegCreateKeyExA
RegDeleteValueA
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
RegCloseKey
user32
EmptyClipboard
VkKeyScanA
ShowWindow
FindWindowA
wsprintfA
SetClipboardData
OpenClipboard
keybd_event
SetFocus
SetForegroundWindow
BlockInput
IsWindow
SendMessageA
MessageBoxA
CloseClipboard
msvcrt
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
__getmainargs
_acmdln
_except_handler3
_controlfp
_CxxThrowException
??1type_info@@UAE@XZ
??3@YAXPAX@Z
exit
_XcptFilter
_exit
malloc
_ftol
strncat
toupper
srand
strtok
atoi
strchr
strncmp
memmove
strncpy
strlen
_snprintf
memset
strcpy
strcmp
sprintf
strstr
strcat
memcpy
rand
fclose
fprintf
fopen
ole32
CoCreateInstance
CoUninitialize
CoInitialize
oleaut32
VariantInit
SysAllocString
VariantClear
Sections
.text Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 5KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 74KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE