Static task
static1
Behavioral task
behavioral1
Sample
a1c16108dd3f7592acd15eced22d7880.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
a1c16108dd3f7592acd15eced22d7880.exe
Resource
win10v2004-20231215-en
General
-
Target
a1c16108dd3f7592acd15eced22d7880
-
Size
220KB
-
MD5
a1c16108dd3f7592acd15eced22d7880
-
SHA1
47554d718358c31ee1f46c75dd687066a97e6cb0
-
SHA256
de39b0c7c1cae9200aef2b3278544a042c43329225fb4153a023cfee01e017a2
-
SHA512
7bff52359b5f9c0ee6811a500f72951d6d30ad4f5e176888460db4c25288a5a6acdcee920c8b6bb7b7abafab835faceaf3af3e310be7ed207abe9b5dfc283aeb
-
SSDEEP
3072:gZ3u5OFkR1mMEcFBwdIDIb9wKO8OjaD5PVOzHgy+r8viOaWpCDqtAbn9sMGKmQz:wuYORucFBwi24N2NdOzHj+6n9Bq9tJ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a1c16108dd3f7592acd15eced22d7880
Files
-
a1c16108dd3f7592acd15eced22d7880.exe windows:1 windows x86 arch:x86
25c94c4eb4f43c2f5d21c9e24a39b57b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegDeleteKeyA
RegOpenKeyExA
RegCloseKey
RegCreateKeyExA
RegDeleteValueA
RegSetValueExA
RegEnumKeyExA
RegQueryInfoKeyA
RegEnumValueA
user32
SetForegroundWindow
wsprintfA
FindWindowA
WaitForInputIdle
CharPrevA
MessageBoxA
CharToOemA
EndDialog
SendDlgItemMessageA
CharNextA
UpdateWindow
ReleaseDC
GetDC
CreateWindowExA
RegisterClassA
LoadCursorA
LoadBitmapA
LoadIconA
SetCursor
CharUpperA
IsWindow
SetTimer
GetClassInfoA
KillTimer
PostMessageA
ScreenToClient
IsIconic
GetSystemMetrics
GetWindowRect
MoveWindow
wvsprintfA
MessageBeep
SetDlgItemTextA
GetDlgItem
SendMessageA
FillRect
PeekMessageA
TranslateMessage
DispatchMessageA
IsDialogMessageA
BeginPaint
GetClientRect
EndPaint
InvalidateRect
DefWindowProcA
DestroyWindow
UnregisterClassA
DialogBoxParamA
LoadStringA
ShowWindow
gdi32
SetTextColor
CreateFontIndirectA
BitBlt
CreateCompatibleDC
LineTo
GetDeviceCaps
GetClipBox
DeleteDC
SetBkColor
MoveToEx
CreatePen
SelectPalette
SelectObject
StretchDIBits
DeleteObject
CreatePalette
GetNearestPaletteIndex
CreateSolidBrush
RealizePalette
kernel32
GetShortPathNameA
GetProfileStringA
VirtualFree
GetFileType
GetStdHandle
GetCPInfo
GetOEMCP
GetACP
UnhandledExceptionFilter
RtlUnwind
GetProcAddress
WideCharToMultiByte
ExitProcess
GetCommandLineA
GetEnvironmentStrings
GetStartupInfoA
GetLogicalDrives
GetFullPathNameA
SetCurrentDirectoryA
GetCurrentDirectoryA
SetEnvironmentVariableA
GetLastError
lstrcmpiA
FindFirstFileA
DeleteFileA
FindNextFileA
FindClose
MultiByteToWideChar
GlobalUnlock
GlobalHandle
GlobalFree
GlobalAlloc
GlobalLock
FatalAppExitA
MulDiv
FindResourceA
LoadResource
LockResource
_lopen
_lclose
GetDriveTypeA
CreateProcessA
WinExec
GetVersion
VirtualAlloc
WaitForSingleObject
GetModuleHandleA
lstrcatA
GetVersionExA
lstrcpyA
GetModuleFileNameA
lstrcpynA
GetSystemInfo
GetWindowsDirectoryA
Sleep
lstrlenA
GlobalMemoryStatus
ole32
OleBuildVersion
OleUninitialize
CoGetClassObject
CoInitialize
CoUninitialize
OleInitialize
Sections
.text Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 9KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 96KB - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 4KB - Virtual size: 53B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 76KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ