Static task
static1
Behavioral task
behavioral1
Sample
c992adff057e5e3d2099829b58077be42e37673805e3929a97b1aed9eb42a188N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c992adff057e5e3d2099829b58077be42e37673805e3929a97b1aed9eb42a188N.exe
Resource
win10v2004-20241007-en
General
-
Target
c992adff057e5e3d2099829b58077be42e37673805e3929a97b1aed9eb42a188N
-
Size
480KB
-
MD5
2bc2a33845dfbddef2b05b8612427ec0
-
SHA1
2ed1247641069204b857eae262b461f295252b30
-
SHA256
c992adff057e5e3d2099829b58077be42e37673805e3929a97b1aed9eb42a188
-
SHA512
39704e543ebe42f4da5aea8c0dce5818c6873dbddd362266fb53c618d6f9fe8d98bd194a6c970f086ed022abd50123a8efe18cfb593d24833e380c9e0fd3929e
-
SSDEEP
12288:h5j9vs/WbPixRyLBn37nhKI3O5LarDOC:hbs/WbPixRyNnLhz3O5LarDOC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c992adff057e5e3d2099829b58077be42e37673805e3929a97b1aed9eb42a188N
Files
-
c992adff057e5e3d2099829b58077be42e37673805e3929a97b1aed9eb42a188N.exe windows:4 windows x86 arch:x86
c01bdd72e4a055f4afe5639312d34b53
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
_XcptFilter
_exit
?terminate@@YAXXZ
_except_handler3
_onexit
__dllonexit
??1type_info@@UAE@XZ
_setjmp3
__CxxFrameHandler
_endthreadex
_beginthreadex
printf
sscanf
sprintf
_errno
strerror
perror
__mb_cur_max
_isctype
_pctype
calloc
_iob
fflush
wcscpy
memcmp
fwrite
fputc
wcscat
fprintf
_ftol
_stat
_fileno
__set_app_type
srand
fseek
ftell
fread
exit
strncmp
atof
memcpy
strchr
_vsnprintf
strcat
strncpy
_CxxThrowException
??0exception@@QAE@ABV0@@Z
??2@YAPAXI@Z
strcpy
strcmp
??3@YAXPAX@Z
strstr
malloc
fopen
strtok
fgets
fclose
free
memset
strlen
system
atoi
_purecall
signal
fputs
gmtime
getenv
_setmode
memchr
tolower
abort
bsearch
realloc
memmove
qsort
time
_memccpy
_strdup
_stricmp
_controlfp
rand
_getch
msvcp60
??0out_of_range@std@@QAE@ABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@1@@Z
??0out_of_range@std@@QAE@ABV01@@Z
??0logic_error@std@@QAE@ABV01@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBDABV?$allocator@D@1@@Z
??1out_of_range@std@@UAE@XZ
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
kernel32
QueryPerformanceCounter
DuplicateHandle
FlushConsoleInputBuffer
GetStartupInfoA
TlsGetValue
SetLastError
TlsFree
TlsAlloc
ReleaseSemaphore
CreateSemaphoreA
GetCurrentProcessId
SetThreadPriority
TlsSetValue
FreeLibrary
DeleteCriticalSection
InitializeCriticalSection
CreateEventA
GetCurrentThreadId
GetCurrentProcess
GetCurrentThread
InterlockedIncrement
GetThreadPriority
EnterCriticalSection
LeaveCriticalSection
ResumeThread
WaitForSingleObject
InterlockedDecrement
DeleteFileA
GetLastError
FormatMessageA
LocalFree
WideCharToMultiByte
TransactNamedPipe
ReadFile
OpenProcess
TerminateProcess
FindResourceA
LoadResource
SizeofResource
LockResource
MultiByteToWideChar
GetTempPathA
GetTickCount
CreateProcessA
ExpandEnvironmentStringsA
GetComputerNameA
GetVersionExA
GlobalMemoryStatus
Sleep
GetStdHandle
AllocConsole
FreeConsole
CloseHandle
GetModuleFileNameA
GetModuleHandleA
CopyFileA
GetProcAddress
LoadLibraryA
GetSystemDirectoryA
WriteFile
CreateFileA
user32
ExitWindowsEx
MessageBoxA
wsprintfA
advapi32
OpenSCManagerA
RegCreateKeyExA
RegCloseKey
RegSetValueExA
RegOpenKeyExA
GetUserNameA
RegDeleteValueA
StartServiceA
DeleteService
ControlService
CloseServiceHandle
OpenServiceA
CreateServiceA
RegQueryValueExA
shell32
ShellExecuteA
ws2_32
WSAIoctl
WSASocketA
setsockopt
htonl
sendto
gethostname
listen
accept
getpeername
ioctlsocket
WSAGetLastError
WSAStartup
WSACleanup
send
closesocket
socket
htons
connect
getsockname
inet_addr
gethostbyaddr
gethostbyname
inet_ntoa
getservbyname
select
__WSAFDIsSet
shutdown
WSASetLastError
recv
bind
netapi32
NetShareEnum
NetUserEnum
NetScheduleJobAdd
NetRemoteTOD
NetUseDel
NetUseAdd
NetApiBufferFree
mpr
WNetAddConnection2W
WNetCancelConnection2W
psapi
EnumProcessModules
EnumProcesses
GetModuleBaseNameA
Sections
.text Size: 312KB - Virtual size: 308KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 64KB - Virtual size: 81KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 48KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ