Static task
static1
Behavioral task
behavioral1
Sample
c413b5fc353f566a47c17c56b69b2cc7b33e048673b78678d33b3aa8804d1d08.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c413b5fc353f566a47c17c56b69b2cc7b33e048673b78678d33b3aa8804d1d08.exe
Resource
win10v2004-20241007-en
General
-
Target
c413b5fc353f566a47c17c56b69b2cc7b33e048673b78678d33b3aa8804d1d08
-
Size
2.6MB
-
MD5
8e921737fd53f5a40e982495f0c7c3c9
-
SHA1
c46e2cae95d387f64964fa000b8daff2f646bdbb
-
SHA256
c413b5fc353f566a47c17c56b69b2cc7b33e048673b78678d33b3aa8804d1d08
-
SHA512
e767b00c4ea757b4af8dd0339260f5748d2475d5b94c6c2a83d20077990379068e8bf7bbfb7b2cf1015ad4f56968456131447ab63225975d2bb5cdb2535f0fdc
-
SSDEEP
49152:rTOYjy2jq6ZutrfM2IAIbu/GFcThB84muqmSj9TgM/rhiYO/CeQTWoNdjjEPOaDT:rBIknAIbuQ2mtnhiY8dT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource c413b5fc353f566a47c17c56b69b2cc7b33e048673b78678d33b3aa8804d1d08
Files
-
c413b5fc353f566a47c17c56b69b2cc7b33e048673b78678d33b3aa8804d1d08.exe windows:6 windows x86 arch:x86
81b21463d07fccae3334ddde819e1970
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleFileNameW
GetProcAddress
LoadLibraryW
LocalAlloc
LocalFree
CopyFileW
MoveFileW
FileTimeToSystemTime
GetTimeZoneInformation
MultiByteToWideChar
WideCharToMultiByte
GetSystemDefaultUILanguage
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
K32GetModuleFileNameExW
K32GetProcessMemoryInfo
K32GetProcessImageFileNameW
FreeLibrary
GetVersionExW
GetSystemDirectoryW
GetSystemTime
OpenProcess
HeapSize
WriteConsoleW
GetProcessHeap
GetCommandLineA
FindFirstFileExW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
SetEndOfFile
HeapReAlloc
GetFileSizeEx
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
HeapFree
GetProcessId
GetCurrentThreadId
GetCurrentThread
TerminateProcess
GetCurrentProcessId
GetCurrentProcess
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
GetLastError
CloseHandle
OutputDebugStringW
RemoveDirectoryW
QueryDosDeviceW
GetFileTime
GetFileAttributesExW
FindNextFileW
FindFirstFileW
FindClose
DeleteFileW
CreateFileW
CreateDirectoryW
ExpandEnvironmentStringsW
HeapAlloc
GetStdHandle
SetFilePointerEx
GetConsoleOutputCP
ReadConsoleW
GetConsoleMode
FlushFileBuffers
InitializeCriticalSectionEx
EncodePointer
DecodePointer
LCMapStringEx
GetStringTypeW
GetCPInfo
SetCurrentDirectoryW
GetFileAttributesW
GetFileType
GetLongPathNameW
GetTempFileNameW
GetTempPathW
GetSystemTimeAsFileTime
RaiseException
WaitForSingleObject
ExitProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FormatMessageW
GetACP
GetLocaleInfoW
GetEnvironmentVariableW
IsDebuggerPresent
IsValidCodePage
GetCommandLineW
GetModuleHandleW
ReadFile
WriteFile
PeekNamedPipe
SetEvent
CreateEventW
WaitForMultipleObjects
IsBadReadPtr
IsBadStringPtrA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
InitializeCriticalSectionAndSpinCount
ResetEvent
WaitForSingleObjectEx
GetStartupInfoW
QueryPerformanceCounter
InitializeSListHead
RtlUnwind
SetLastError
LoadLibraryExW
GetDriveTypeW
GetFullPathNameW
SetEnvironmentVariableW
GetCurrentDirectoryW
GetFileInformationByHandle
SystemTimeToTzSpecificLocalTime
MoveFileExW
SetStdHandle
GetModuleHandleExW
user32
LoadIconW
LoadCursorW
GetWindowThreadProcessId
SetForegroundWindow
GetForegroundWindow
UpdateWindow
EnableWindow
KillTimer
SetTimer
BringWindowToTop
IsWindowVisible
SetWindowPos
ShowWindow
CreateWindowExW
RegisterClassExW
PostQuitMessage
DefWindowProcW
AttachThreadInput
UnregisterHotKey
MessageBoxW
PostThreadMessageW
RegisterClassW
PeekMessageW
UnregisterClassW
DestroyWindow
MsgWaitForMultipleObjects
DdeInitializeW
DdeUninitialize
DdeConnect
DdeDisconnect
DdePostAdvise
DdeNameService
DdeClientTransaction
DdeCreateDataHandle
DdeGetData
DdeFreeDataHandle
DdeGetLastError
DdeCreateStringHandleW
DdeQueryStringW
DdeFreeStringHandle
RegisterHotKey
DispatchMessageW
TranslateMessage
GetMessageW
advapi32
RegEnumKeyW
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegEnumValueW
RegEnumKeyExW
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExW
RegCloseKey
SetSecurityDescriptorOwner
SetSecurityDescriptorGroup
SetSecurityDescriptorDacl
IsValidSecurityDescriptor
InitializeSecurityDescriptor
InitializeAcl
GetLengthSid
FreeSid
DuplicateToken
AllocateAndInitializeSid
AddAccessAllowedAce
AccessCheck
OpenThreadToken
OpenProcessToken
GetUserNameW
shell32
SHGetFolderPathW
SHFileOperationW
ShellExecuteW
ole32
CoTaskMemFree
OleUninitialize
CoCreateInstance
OleInitialize
Sections
.text Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 321KB - Virtual size: 321KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ