Static task
static1
Behavioral task
behavioral1
Sample
214b92672a662e544bc5123a92efb60750a15b42eb780e88121ab58cf32c21a7.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
214b92672a662e544bc5123a92efb60750a15b42eb780e88121ab58cf32c21a7.exe
Resource
win10v2004-20231023-en
General
-
Target
214b92672a662e544bc5123a92efb60750a15b42eb780e88121ab58cf32c21a7
-
Size
1.0MB
-
MD5
5e27a9dbc45f8cb890ee7a6dcc068cfa
-
SHA1
c6ab7b13af339828d0befd1050124e9461ea6196
-
SHA256
214b92672a662e544bc5123a92efb60750a15b42eb780e88121ab58cf32c21a7
-
SHA512
956b89744b6f5f5b81e87e2fa040a0fb5694159c5bb341a044476c673e8c6595c1cf4ca0a8a40c974f547371f1d31c32ea944341ca0e478c88e90761b58b1792
-
SSDEEP
24576:Fk/AERSgv9VBsbvsPgibDtWL9JEuPhsHvSX3Xz:Fk/TSAvusIaWL9JEuPhsHvSX3Xz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 214b92672a662e544bc5123a92efb60750a15b42eb780e88121ab58cf32c21a7
Files
-
214b92672a662e544bc5123a92efb60750a15b42eb780e88121ab58cf32c21a7.exe windows:4 windows x86 arch:x86
ce3c8217b75656cf5d457e41c355b72e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetOEMCP
Sleep
GetStringTypeA
GetStringTypeW
ReadFile
LCMapStringA
LCMapStringW
SetStdHandle
SetFilePointer
FlushFileBuffers
CloseHandle
lstrlenA
LocalFree
lstrcpynA
LocalAlloc
GlobalFree
GlobalUnlock
GlobalHandle
GlobalLock
GlobalReAlloc
GetACP
LocalReAlloc
lstrcpyA
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
lstrcmpiA
GlobalGetAtomNameA
lstrcatA
GetProcessVersion
lstrcmpA
GlobalFlags
InterlockedExchange
GetCPInfo
MultiByteToWideChar
InterlockedIncrement
InterlockedDecrement
IsBadCodePtr
SetUnhandledExceptionFilter
WriteFile
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
HeapCreate
HeapDestroy
GetVersionExA
GetEnvironmentVariableA
GetModuleFileNameA
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
IsBadWritePtr
VirtualAlloc
VirtualFree
GetLastError
TlsGetValue
SetLastError
TlsAlloc
TlsSetValue
GetCurrentThreadId
HeapSize
GetCurrentProcess
TerminateProcess
ExitProcess
GetVersion
GetCommandLineA
GetStartupInfoA
GetModuleHandleA
HeapFree
HeapAlloc
HeapReAlloc
RtlUnwind
RaiseException
GetProcessHeap
IsBadReadPtr
FreeLibrary
LoadLibraryA
GlobalAlloc
GetProcAddress
user32
CopyRect
AdjustWindowRectEx
SetFocus
GetSysColor
MapWindowPoints
PostMessageA
SetWindowTextA
GetSysColorBrush
ReleaseDC
GetDC
GetClassNameA
PtInRect
ClientToScreen
DestroyMenu
TabbedTextOutA
GrayStringA
WinHelpA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetTopWindow
GetWindowTextA
GetDlgCtrlID
GetClassLongA
SetPropA
GetPropA
CallWindowProcA
RemovePropA
GetMessageTime
GetMessagePos
GetForegroundWindow
SetForegroundWindow
GetWindow
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetSystemMetrics
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetKeyState
CallNextHookEx
PeekMessageA
SetWindowsHookExA
GetParent
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
SendMessageA
MessageBoxA
EnableWindow
UnhookWindowsHookEx
DefWindowProcA
DestroyWindow
BeginPaint
GetClientRect
DrawTextA
DispatchMessageA
TranslateMessage
TranslateAcceleratorA
GetMessageA
GetDlgItem
EndPaint
PostQuitMessage
CreateWindowExA
ShowWindow
UpdateWindow
LoadIconA
LoadCursorA
RegisterClassExA
LoadStringA
GetCapture
CheckMenuItem
comctl32
ord17
gdi32
SaveDC
DeleteDC
DeleteObject
GetDeviceCaps
GetObjectA
SetBkColor
SetTextColor
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetClipBox
CreateBitmap
RestoreDC
SelectObject
GetStockObject
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
Sections
.text Size: 112KB - Virtual size: 110KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 888KB - Virtual size: 885KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ