Static task
static1
Behavioral task
behavioral1
Sample
14238680ff4f9d3fcc012d0e78761d04f3beca8416b50bba9137188f55175e37.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
14238680ff4f9d3fcc012d0e78761d04f3beca8416b50bba9137188f55175e37.exe
Resource
win10v2004-20230915-en
General
-
Target
14238680ff4f9d3fcc012d0e78761d04f3beca8416b50bba9137188f55175e37
-
Size
584KB
-
MD5
f15b5b3bc65c597eb54abf64caf1e5a0
-
SHA1
eba1cc8682000b1412eff4bdd71c38655ba3f44f
-
SHA256
14238680ff4f9d3fcc012d0e78761d04f3beca8416b50bba9137188f55175e37
-
SHA512
9e59352af44ab2a789d7c9623d65a8d67e9c860ce889e8d5a7a09a0ba01cd5e32fe69e4b6664154790d14e3927b6bc0728213cbd437fae69704ed48c2b25dee7
-
SSDEEP
3072:ldRnSEo7jbvfDe/DQ9srrKtOhMWBx6aG475Ta9+4BI:/kEY7e/owJhM6I9+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 14238680ff4f9d3fcc012d0e78761d04f3beca8416b50bba9137188f55175e37
Files
-
14238680ff4f9d3fcc012d0e78761d04f3beca8416b50bba9137188f55175e37.exe windows:4 windows x86
f4e2c81c08de984c90a4dcb1ca508204
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
TlsAlloc
GlobalHandle
TlsFree
GlobalReAlloc
TlsSetValue
LocalReAlloc
TlsGetValue
GlobalFlags
GetProcessVersion
GetCPInfo
GetOEMCP
FileTimeToSystemTime
FileTimeToLocalFileTime
GetFileAttributesA
GetFileSize
GetFileTime
SetErrorMode
RtlUnwind
GetStartupInfoA
GetCommandLineA
ExitProcess
TerminateProcess
HeapFree
HeapAlloc
RaiseException
HeapReAlloc
GetACP
GetTimeZoneInformation
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
HeapCreate
VirtualFree
LCMapStringA
LCMapStringW
VirtualAlloc
IsBadWritePtr
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
SetStdHandle
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetFullPathNameA
GetVolumeInformationA
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
CreateFileA
GetCurrentProcess
DuplicateHandle
SetLastError
GetVersion
lstrcatA
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GetModuleHandleA
GlobalDeleteAtom
lstrcmpA
GetCurrentThread
GetCurrentThreadId
MultiByteToWideChar
WideCharToMultiByte
InterlockedDecrement
InterlockedIncrement
lstrlenA
lstrcpynA
lstrcpyA
FindFirstFileA
FindClose
CreateToolhelp32Snapshot
Process32First
Process32Next
lstrcmpiA
OutputDebugStringA
UnmapViewOfFile
LocalAlloc
CreateFileMappingA
MapViewOfFile
LocalFree
GetModuleFileNameA
LoadLibraryA
GetVersionExA
CreateThread
WaitForSingleObject
TerminateThread
FreeLibrary
GetProcAddress
Sleep
ReleaseMutex
CreateMutexA
GetLastError
CloseHandle
GetPrivateProfileIntA
GetPrivateProfileStructA
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
WritePrivateProfileStringA
GetPrivateProfileStringA
HeapSize
user32
CopyRect
GetClientRect
AdjustWindowRectEx
SetFocus
GetSysColor
MapWindowPoints
LoadIconA
SetWindowTextA
ClientToScreen
GetDC
ReleaseDC
TabbedTextOutA
DrawTextA
GrayStringA
CharUpperA
LoadCursorA
GetClassNameA
PtInRect
GetSysColorBrush
GetTopWindow
GetCapture
WinHelpA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetDlgItem
GetWindowTextA
GetDlgCtrlID
DefWindowProcA
DestroyWindow
CreateWindowExA
GetClassLongA
SetPropA
UnhookWindowsHookEx
GetPropA
CallWindowProcA
RemovePropA
GetMessageTime
GetMessagePos
GetWindow
SetWindowPos
RegisterWindowMessageA
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
GetSystemMetrics
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
TranslateMessage
GetActiveWindow
GetKeyState
CallNextHookEx
ValidateRect
IsWindowVisible
PeekMessageA
SetWindowsHookExA
GetParent
IsWindowEnabled
GetWindowLongA
MessageBoxA
SetCursor
PostQuitMessage
wsprintfA
EnableWindow
SendMessageA
GetForegroundWindow
GetWindowThreadProcessId
ShowWindow
GetLastActivePopup
SetForegroundWindow
CreatePopupMenu
AppendMenuA
SetMenuDefaultItem
GetCursorPos
TrackPopupMenu
DestroyMenu
IsIconic
SetActiveWindow
LoadStringA
SetWindowLongA
PostMessageA
FindWindowA
PostThreadMessageA
SetTimer
KillTimer
GetMessageA
DispatchMessageA
UnregisterClassA
gdi32
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
SetViewportOrgEx
GetDeviceCaps
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
DeleteObject
SetMapMode
GetClipBox
CreateBitmap
GetStockObject
RestoreDC
SaveDC
DeleteDC
SetTextColor
GetObjectA
SelectObject
SetBkColor
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegCreateKeyExA
RegCloseKey
RegSetValueExA
RegOpenKeyExA
RegCreateKeyA
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
shell32
ShellExecuteA
Shell_NotifyIconA
SHGetFileInfoA
comctl32
ord17
ole32
CoCreateInstance
CoUninitialize
CoInitialize
Sections
.text Size: 88KB - Virtual size: 86KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 460KB - Virtual size: 457KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ