Static task
static1
Behavioral task
behavioral1
Sample
32c9f33f9fe64bd3ccc680afc20c10ea7eb590858102022772bee9f0de946a5d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
32c9f33f9fe64bd3ccc680afc20c10ea7eb590858102022772bee9f0de946a5d.exe
Resource
win10v2004-20231215-en
General
-
Target
32c9f33f9fe64bd3ccc680afc20c10ea7eb590858102022772bee9f0de946a5d
-
Size
1.4MB
-
MD5
180c6d63e1ef8e8e616bec35fd3b8a0b
-
SHA1
f5f7f2d8bfe03cef49f584eed9779a4d4dcdce9f
-
SHA256
32c9f33f9fe64bd3ccc680afc20c10ea7eb590858102022772bee9f0de946a5d
-
SHA512
4e7e4d8ca235c9afe7b404ef32bb63c7eacf255e1505b1c65295871ecfb10936d660f73a03bc8ae00a4dda43f2cc9a4e707c4019b999ecf2605c77069eb7b5de
-
SSDEEP
24576:GxZP/TwSfVcYG3K/cJHlnFR+IGNe8j3Iz:GxZPLNiXicJFFRGNzj3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 32c9f33f9fe64bd3ccc680afc20c10ea7eb590858102022772bee9f0de946a5d
Files
-
32c9f33f9fe64bd3ccc680afc20c10ea7eb590858102022772bee9f0de946a5d.exe windows:4 windows x86 arch:x86
0184fbac2438306f556d751946a24411
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
TerminateProcess
OpenProcess
GetCurrentThreadId
MultiByteToWideChar
WideCharToMultiByte
lstrlenW
GetLastError
InterlockedIncrement
InterlockedDecrement
lstrlenA
lstrcmpiA
IsDBCSLeadByte
FreeLibrary
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
GetModuleHandleA
GetModuleFileNameA
GetExitCodeProcess
DeleteFileA
Sleep
CreateEventA
OpenEventA
CloseHandle
OutputDebugStringA
CreateDirectoryA
SetFileAttributesA
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
RaiseException
SetEndOfFile
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
CreateProcessA
GetLocalTime
LoadLibraryA
FlushFileBuffers
GetSystemTimeAsFileTime
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlUnwind
HeapFree
HeapAlloc
VirtualProtect
VirtualAlloc
GetProcAddress
GetSystemInfo
VirtualQuery
HeapReAlloc
ReadFile
WriteFile
GetConsoleCP
GetConsoleMode
SetFilePointer
GetCommandLineA
GetProcessHeap
GetStartupInfoA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
SetHandleCount
GetStdHandle
GetFileType
HeapSize
ExitProcess
GetCPInfo
GetOEMCP
IsValidCodePage
SetStdHandle
CreateFileA
HeapDestroy
HeapCreate
VirtualFree
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
user32
CharNextA
DestroyWindow
MessageBoxA
UnregisterClassA
DefWindowProcA
advapi32
RegOpenKeyExA
RegEnumKeyExA
RegQueryInfoKeyA
RegSetValueExA
RegDeleteKeyA
RegCreateKeyExA
RegCloseKey
RegDeleteValueA
ole32
CoTaskMemRealloc
CoCreateInstance
CoUninitialize
CoInitialize
CoTaskMemFree
CoTaskMemAlloc
oleaut32
VarUI4FromStr
comctl32
InitCommonControlsEx
psapi
GetModuleBaseNameA
EnumProcessModules
EnumProcesses
Sections
.text Size: 92KB - Virtual size: 90KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.2MB - Virtual size: 1.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE