Static task
static1
Behavioral task
behavioral1
Sample
14cf43710305d23ff100a0020ddb076f.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
14cf43710305d23ff100a0020ddb076f.exe
Resource
win10v2004-20231215-en
General
-
Target
14cf43710305d23ff100a0020ddb076f
-
Size
80KB
-
MD5
14cf43710305d23ff100a0020ddb076f
-
SHA1
3f446f5c10cfb05c50d9cf6c837505543f5d6e9f
-
SHA256
22dbdf754f1582f94534cbe5fa7eb6475c73fe95d7e1451ad4a4d5964f1c2eae
-
SHA512
2a688171998d339fa1b522f74467415ca5ec916803697f231526cb7e74e4f028ac36bf772eac61f8d81f0b7075a7f82cf0a9b2a7a9658c6612186a82d0853834
-
SSDEEP
1536:xZ3KLbNyA74z9D/dx7GhT7/RPDXjiHc9xRMbkOTTxYqyqXxf/rzlF:2LbNy+4z9D/dx74TzNDD9xRMIChfl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 14cf43710305d23ff100a0020ddb076f
Files
-
14cf43710305d23ff100a0020ddb076f.exe windows:5 windows x86 arch:x86
2dd190112d8b40aa4c3fda3765cb94ed
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
user32
PostQuitMessage
GetSysColor
SetWindowTextA
UnhookWindowsHookEx
SetWindowPos
GetMessageA
GetSysColorBrush
GetSubMenu
GetScrollPos
EqualRect
FrameRect
EnumWindows
EnableMenuItem
kernel32
VirtualAllocEx
GetTickCount
GetOEMCP
GetFileAttributesA
GetStartupInfoA
InterlockedExchange
GetTempPathA
RtlUnwind
QueryPerformanceCounter
GetThreadLocale
GetSystemTime
GetCurrentProcessId
GetTimeZoneInformation
ExitProcess
SetUnhandledExceptionFilter
FileTimeToSystemTime
gdi32
GetMapMode
DPtoLP
CopyEnhMetaFileA
ExcludeClipRect
FillRgn
CreateICW
SetViewportExtEx
CreateCompatibleBitmap
SelectClipPath
ole32
DoDragDrop
OleRun
CoCreateInstance
StringFromGUID2
CoRevokeClassObject
StgOpenStorage
CoTaskMemRealloc
CoInitialize
CoInitializeSecurity
advapi32
RegCreateKeyA
GetUserNameA
CheckTokenMembership
AdjustTokenPrivileges
RegQueryValueExW
RegCreateKeyExW
FreeSid
GetSecurityDescriptorDacl
QueryServiceStatus
CryptHashData
msvcrt
_mbscmp
puts
_lock
iswspace
_flsbuf
strlen
__getmainargs
_strdup
strcspn
_CIpow
strncpy
__initenv
fprintf
__setusermatherr
signal
fflush
raise
_fdopen
comctl32
InitCommonControls
ImageList_Write
ImageList_LoadImageA
CreatePropertySheetPageA
ImageList_GetIcon
ImageList_GetIconSize
ImageList_ReplaceIcon
ImageList_LoadImageW
ImageList_GetBkColor
ImageList_SetIconSize
ImageList_DragEnter
ImageList_DrawEx
ImageList_Destroy
shell32
SHGetPathFromIDList
DragQueryFileA
SHBrowseForFolderA
DragAcceptFiles
CommandLineToArgvW
ShellExecuteEx
ShellExecuteW
ExtractIconExW
DragQueryFileW
DoEnvironmentSubstW
ExtractIconW
oleaut32
SafeArrayCreate
SafeArrayPtrOfIndex
SafeArrayUnaccessData
SafeArrayGetUBound
VariantCopy
SafeArrayPutElement
SafeArrayRedim
SysReAllocStringLen
Sections
.text Size: 33KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE