Static task
static1
Behavioral task
behavioral1
Sample
435178f82bf6b121c9592df4488855b5a766047dd66a6f2c9999dfc22e9919ac.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
435178f82bf6b121c9592df4488855b5a766047dd66a6f2c9999dfc22e9919ac.exe
Resource
win10v2004-20231023-en
General
-
Target
435178f82bf6b121c9592df4488855b5a766047dd66a6f2c9999dfc22e9919ac
-
Size
354KB
-
MD5
9d2bdd23f8646b1920e429ba59a99a04
-
SHA1
b1bd9d60d4a94a176fb675658f705c7a5860650f
-
SHA256
435178f82bf6b121c9592df4488855b5a766047dd66a6f2c9999dfc22e9919ac
-
SHA512
68516e36241ae2436b29398f33796a3b82b33613430ea5681d47468eea084f3c78efb865534bc605cc3cf483ce634f8dfd8065ddb6b362b9fd7dec88abe6ac07
-
SSDEEP
6144:RxA2QU67aPjjJ4YYB/A9Ue/41He9PR+2T34G04WaSF2f1XQJMcw/S1yW1kdY/:RxA2QU67aPjjJ4YYB/A9Ue/41He9PR+U
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 435178f82bf6b121c9592df4488855b5a766047dd66a6f2c9999dfc22e9919ac
Files
-
435178f82bf6b121c9592df4488855b5a766047dd66a6f2c9999dfc22e9919ac.exe windows:5 windows x86
c16a5dd09d338dc2da9663a01063e40b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntdll
RtlAssert
RtlUnicodeStringToInteger
advapi32
BackupEventLogW
ClearEventLogW
CloseEventLog
ConvertSidToStringSidW
EqualSid
GetNumberOfEventLogRecords
IsValidSid
LookupAccountSidW
OpenBackupEventLogW
OpenEventLogW
ReadEventLogW
RegCloseKey
RegConnectRegistryW
RegCreateKeyExW
RegEnumKeyExW
RegOpenKeyExW
RegQueryInfoKeyW
RegQueryValueExW
RegSetValueExW
comctl32
ImageList_Create
ImageList_ReplaceIcon
InitCommonControlsEx
PropertySheetW
comdlg32
GetOpenFileNameW
GetSaveFileNameW
kernel32
CloseHandle
CreateEventW
CreateThread
DeleteCriticalSection
EnterCriticalSection
ExpandEnvironmentStringsW
FileTimeToLocalFileTime
FileTimeToSystemTime
FindClose
FindFirstFileW
FormatMessageW
FreeLibrary
GetCommandLineW
GetComputerNameW
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetDateFormatW
GetFileAttributesExW
GetLastError
GetLocaleInfoW
GetModuleHandleA
GetNumberFormatW
GetProcAddress
GetProcessHeap
GetStartupInfoW
GetSystemTimeAsFileTime
GetTickCount
GetTimeFormatW
GlobalAlloc
GlobalFree
GlobalLock
GlobalUnlock
HeapAlloc
HeapFree
HeapReAlloc
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryExW
LoadLibraryW
LocalFree
MulDiv
QueryPerformanceCounter
ResumeThread
RtlUnwind
SetEvent
SetLastError
SetUnhandledExceptionFilter
Sleep
SystemTimeToFileTime
TerminateProcess
TlsGetValue
UnhandledExceptionFilter
VirtualProtect
VirtualQuery
WaitForMultipleObjects
WaitForSingleObject
msvcrt
__dllonexit
__lconv_init
__set_app_type
__setusermatherr
__wgetmainargs
__winitenv
_amsg_exit
_cexit
_fmode
_fpreset
_initterm
_iob
_lock
_onexit
_unlock
_vsnwprintf
_wcmdln
_wcsicmp
_wtol
abort
calloc
exit
fprintf
free
fwrite
iswctype
malloc
memmove
memset
signal
strncmp
swprintf
swscanf
towupper
vfprintf
wcschr
wcscpy
wcslen
wcsncpy
wcsstr
wcstok
shell32
CommandLineToArgvW
ShellAboutW
ShellExecuteW
shlwapi
StrFormatByteSizeW
gdi32
CreateFontIndirectW
DeleteObject
GetDeviceCaps
user32
BeginDeferWindowPos
CheckMenuItem
CheckMenuRadioItem
CheckRadioButton
CloseClipboard
CreateDialogParamW
CreateWindowExW
DefWindowProcW
DeferWindowPos
DestroyWindow
DialogBoxParamW
DispatchMessageW
EmptyClipboard
EnableMenuItem
EnableWindow
EndDeferWindowPos
EndDialog
GetCapture
GetClientRect
GetCursorPos
GetDC
GetDlgItem
GetDlgItemTextW
GetFocus
GetMenu
GetMessageW
GetParent
GetScrollInfo
GetSysColor
GetSystemMetrics
GetWindowLongW
GetWindowPlacement
GetWindowRect
InvalidateRect
IsWindow
IsWindowVisible
LoadAcceleratorsW
LoadCursorW
LoadIconW
LoadImageW
LoadStringW
MapWindowPoints
MessageBoxW
MoveWindow
OpenClipboard
PostQuitMessage
RegisterClassExW
ReleaseCapture
ReleaseDC
ScreenToClient
ScrollWindowEx
SendDlgItemMessageW
SendMessageW
SetCapture
SetClipboardData
SetCursor
SetDlgItemInt
SetDlgItemTextW
SetFocus
SetScrollInfo
SetWindowLongW
SetWindowPos
SetWindowTextW
ShowScrollBar
ShowWindow
TranslateAcceleratorW
TranslateMessage
UpdateWindow
Sections
.text Size: 49KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
/4 Size: 512B - Virtual size: 20B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 4KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 52B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 219KB - Virtual size: 218KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rossym Size: 74KB - Virtual size: 73KB
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ