Static task
static1
Behavioral task
behavioral1
Sample
8700ca7ddd032b0c01df85ee546cf10972c3fd0e591e7bab34dbae49233fee49N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8700ca7ddd032b0c01df85ee546cf10972c3fd0e591e7bab34dbae49233fee49N.exe
Resource
win10v2004-20240802-en
General
-
Target
8700ca7ddd032b0c01df85ee546cf10972c3fd0e591e7bab34dbae49233fee49N
-
Size
252KB
-
MD5
82e447d703cae6d297637265ed398880
-
SHA1
bedbbd0951639f4c48db848f144cd9826946462c
-
SHA256
8700ca7ddd032b0c01df85ee546cf10972c3fd0e591e7bab34dbae49233fee49
-
SHA512
d7ce8fafdf968840845877b4911e8ab467298cd2fecfe1dca61bdd136343e02e9fe76c45d5f8a7faa43f4b51241483c07f73f8909661ed471d4c915b14fb1de7
-
SSDEEP
6144:nMqnNpiph2S0h1+25nD+YK1gS60yMnY3LmY:nnnNMpp0h1hQgSfyh3L
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8700ca7ddd032b0c01df85ee546cf10972c3fd0e591e7bab34dbae49233fee49N
Files
-
8700ca7ddd032b0c01df85ee546cf10972c3fd0e591e7bab34dbae49233fee49N.exe windows:4 windows x86 arch:x86
cbe53f9a8e5e8ba8b123369d5515d290
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
_XcptFilter
_exit
_iob
?terminate@@YAXXZ
_onexit
__dllonexit
??1type_info@@UAE@XZ
_endthreadex
__CxxFrameHandler
_beginthreadex
_except_handler3
sprintf
isdigit
calloc
printf
perror
_errno
strerror
fflush
sscanf
wcstombs
mbstowcs
wcscpy
fprintf
strcat
toupper
fputc
wcscat
strtok
_ftol
__p__commode
srand
fwrite
fseek
ftell
malloc
free
exit
strncmp
atof
memcmp
strchr
_memccpy
_itoa
_stricmp
strncat
system
atoi
strcpy
fgets
fopen
fread
strcmp
fclose
memmove
memcpy
??0exception@@QAE@ABQBD@Z
??1exception@@UAE@XZ
_CxxThrowException
??0exception@@QAE@ABV0@@Z
_vsnprintf
strlen
strncpy
memset
strstr
??2@YAPAXI@Z
??3@YAXPAX@Z
_purecall
__p__fmode
__set_app_type
_controlfp
rand
_strdup
msvcp60
?_Xran@std@@YAXXZ
?_Xlen@std@@YAXXZ
kernel32
GetStartupInfoA
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
TlsGetValue
SetLastError
TlsFree
TlsAlloc
GetExitCodeThread
ReleaseSemaphore
CreateSemaphoreA
GetCurrentProcessId
SetThreadPriority
RaiseException
TlsSetValue
DeleteCriticalSection
InitializeCriticalSection
WaitForMultipleObjects
CreateEventA
GetCurrentThreadId
GetCurrentProcess
GetCurrentThread
DuplicateHandle
InterlockedIncrement
GetThreadPriority
EnterCriticalSection
LeaveCriticalSection
ResumeThread
WaitForSingleObject
ResetEvent
InterlockedDecrement
TransactNamedPipe
MultiByteToWideChar
GetLastError
CopyFileA
GetModuleFileNameA
OpenProcess
GetModuleHandleA
FreeConsole
AllocConsole
GetStdHandle
WriteFile
CreateNamedPipeA
WaitNamedPipeA
CreateFileA
TerminateProcess
CloseHandle
GetTickCount
Sleep
FreeLibrary
GetProcAddress
LoadLibraryA
DeleteFileA
ExitProcess
GetSystemDirectoryA
CreateProcessA
ExpandEnvironmentStringsA
GetComputerNameA
GetVersionExA
GlobalMemoryStatus
ReadFile
user32
ExitWindowsEx
wsprintfA
advapi32
OpenServiceA
RegCloseKey
RegQueryInfoKeyA
RegEnumKeyExA
DeleteService
ControlService
EnumServicesStatusA
RegQueryValueExA
StartServiceCtrlDispatcherA
RegisterServiceCtrlHandlerA
SetServiceStatus
StartServiceA
RegDeleteValueA
OpenSCManagerA
CreateServiceA
CloseServiceHandle
ChangeServiceConfig2A
RegCreateKeyExA
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
GetUserNameA
RegOpenKeyExA
RegSetValueExA
shell32
ShellExecuteA
ws2_32
gethostname
sendto
htonl
setsockopt
WSASocketA
ntohl
WSASetLastError
WSAIoctl
getservbyname
shutdown
ntohs
gethostbyaddr
inet_ntoa
gethostbyname
ioctlsocket
getpeername
getsockname
send
connect
WSACleanup
WSAStartup
inet_addr
recv
WSAGetLastError
select
__WSAFDIsSet
accept
bind
listen
closesocket
socket
getsockopt
htons
netapi32
NetUseDel
NetApiBufferFree
NetShareEnum
NetUserEnum
NetScheduleJobAdd
NetRemoteTOD
NetUseAdd
mpr
WNetAddConnection2A
WNetCancelConnection2W
WNetCancelConnection2A
WNetAddConnection2W
psapi
EnumProcessModules
EnumProcesses
GetModuleBaseNameA
dnsapi
DnsQuery_A
Sections
.text Size: 160KB - Virtual size: 157KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 24KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 48KB - Virtual size: 62KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.asdfe Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE