Static task
static1
Behavioral task
behavioral1
Sample
999b7bcab7f40fd23481b09d5dcace628f4d1b09ab1e78499e0fa62b8797003d.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
999b7bcab7f40fd23481b09d5dcace628f4d1b09ab1e78499e0fa62b8797003d.exe
Resource
win10v2004-20230915-en
General
-
Target
999b7bcab7f40fd23481b09d5dcace628f4d1b09ab1e78499e0fa62b8797003d
-
Size
390KB
-
MD5
f4022b25598cd4a61b6991d41d68c99e
-
SHA1
888fe22f2386507e841d5bc8a5e39502b1a77cd1
-
SHA256
999b7bcab7f40fd23481b09d5dcace628f4d1b09ab1e78499e0fa62b8797003d
-
SHA512
3825c2bbd1a56711c54e7f31d1284002a34ff2cec529c23d9650a4ba08b04203519ff1cc412f8bd731871cef140ed3f60b241610b4bab3367018362af37f2448
-
SSDEEP
6144:fSDLoYhs87eb/iNuqYp/MLeCK7QCHupbsMqXzynoJzt/8LxVXvDbQfv99PT1:aDUSs8A/JqVXK7duyrX2mt/uHQd9b
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 999b7bcab7f40fd23481b09d5dcace628f4d1b09ab1e78499e0fa62b8797003d
Files
-
999b7bcab7f40fd23481b09d5dcace628f4d1b09ab1e78499e0fa62b8797003d.exe windows:5 windows x86
85f93ec750e6f7137bb7fe5a5261ac14
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
EnumResourceNamesW
CreateFileA
SetThreadContext
PeekNamedPipe
VirtualQuery
SetEndOfFile
LoadResource
SetConsoleTextAttribute
OpenJobObjectA
GetLogicalDriveStringsW
GlobalLock
WriteConsoleInputA
CreateHardLinkA
FreeEnvironmentStringsA
GetModuleHandleW
GetTickCount
GetDateFormatA
LoadLibraryW
IsValidLocale
GetFileAttributesA
FindNextVolumeW
ReplaceFileW
FileTimeToSystemTime
IsDBCSLeadByte
GetShortPathNameA
GetTempFileNameW
ReadConsoleOutputCharacterA
GetProcAddress
VirtualAlloc
BackupWrite
BeginUpdateResourceA
FoldStringW
GetModuleHandleA
FindFirstChangeNotificationA
FindNextFileW
FindFirstVolumeA
CloseHandle
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetLocaleInfoW
LoadLibraryA
FlushFileBuffers
GetConsoleMode
GetConsoleCP
GetLastError
InterlockedIncrement
InterlockedDecrement
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapFree
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
MultiByteToWideChar
GetStartupInfoW
RtlUnwind
RaiseException
LCMapStringA
WideCharToMultiByte
LCMapStringW
GetCPInfo
HeapAlloc
HeapCreate
VirtualFree
HeapReAlloc
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
GetACP
GetOEMCP
IsValidCodePage
SetFilePointer
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapSize
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
GetStringTypeA
GetStringTypeW
InitializeCriticalSectionAndSpinCount
SetStdHandle
user32
CharToOemBuffA
GetMenuItemID
GetKeyNameTextA
GetMessageExtraInfo
ChangeMenuA
GetParent
LoadMenuA
GetClassInfoExW
CopyIcon
LoadBitmapW
DdeQueryStringA
CloseWindow
gdi32
GetCharWidthI
Sections
.text Size: 334KB - Virtual size: 333KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 321KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 34KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ