Static task
static1
Behavioral task
behavioral1
Sample
d7046d3509e715a5638046a518302bed02d03de12956da07d2d4c34669eea231N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d7046d3509e715a5638046a518302bed02d03de12956da07d2d4c34669eea231N.exe
Resource
win10v2004-20241007-en
General
-
Target
d7046d3509e715a5638046a518302bed02d03de12956da07d2d4c34669eea231N
-
Size
268KB
-
MD5
259e892200a25ad7ec0312886ab75cc0
-
SHA1
98ef7968f726a370a3ebfcecfc4cc913cfd6c5db
-
SHA256
d7046d3509e715a5638046a518302bed02d03de12956da07d2d4c34669eea231
-
SHA512
d008c70dcbed59dd8daef65756b844192f71400e954e9414a6157fda1cdf4cdc8fc3a2124a00ad32f1633bf372f98f5a77489f2a879647a42a9d9992d47e9ea5
-
SSDEEP
6144:oW34LZMif0J5YtkVNS1m9Bkcy2ws4HCr9pTnfjFXpLdOw9u2y:oW34Cif0JWt6Sm1ws4HYprrJdQ2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d7046d3509e715a5638046a518302bed02d03de12956da07d2d4c34669eea231N
Files
-
d7046d3509e715a5638046a518302bed02d03de12956da07d2d4c34669eea231N.exe windows:4 windows x86 arch:x86
f0501f11bb869048251ae707c1f69888
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_beginthreadex
memcpy
calloc
_CIacos
printf
_CIpow
__dllonexit
_onexit
??1type_info@@UAE@XZ
_exit
_XcptFilter
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
wcslen
mbstowcs
_strupr
rand
_CxxThrowException
strncat
strcat
vsprintf
exit
fopen
fwrite
fclose
strrchr
_except_handler3
free
strcmp
strcpy
malloc
memcmp
__CxxFrameHandler
??2@YAPAXI@Z
memmove
??3@YAXPAX@Z
_ftol
strlen
memset
strstr
wcscpy
atoi
_access
wcstombs
kernel32
MultiByteToWideChar
InterlockedExchange
LocalAlloc
FreeLibrary
LocalFree
WideCharToMultiByte
GetStartupInfoA
GetModuleHandleA
GetExitCodeThread
TerminateThread
CreateThread
OutputDebugStringA
lstrcatA
lstrlenA
RaiseException
GetLastError
InterlockedDecrement
SetEvent
WaitForSingleObject
LoadLibraryA
GetProcAddress
CloseHandle
Sleep
CreateEventA
user32
PostThreadMessageA
IsWindow
CreateWindowExA
SendMessageA
GetMessageA
ws2_32
setsockopt
connect
socket
WSAStartup
htons
gethostbyname
getsockname
gethostname
send
select
closesocket
recv
ntohs
WSACleanup
msvcp60
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBDABV?$allocator@D@1@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
ole32
OleRun
CLSIDFromString
CLSIDFromProgID
CoInitialize
CoUninitialize
CoCreateInstance
oleaut32
GetErrorInfo
VariantClear
SysFreeString
SysAllocString
msvfw32
ICSendMessage
Sections
.text Size: 200KB - Virtual size: 197KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 40KB - Virtual size: 66KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ