Static task
static1
Behavioral task
behavioral1
Sample
14060c011567a8d8e189d153410ce8d9.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
14060c011567a8d8e189d153410ce8d9.exe
Resource
win10v2004-20231222-en
General
-
Target
14060c011567a8d8e189d153410ce8d9
-
Size
216KB
-
MD5
14060c011567a8d8e189d153410ce8d9
-
SHA1
e5b466dfa6c4129218f5aa72ada161e33e4a52c4
-
SHA256
d3adc38b5a70815fc8c5e9df7d4b4960c23f6f3b6e1894ccec9894aba93577e8
-
SHA512
fddcb2412da3c5d30140792d1584afdcb077c42eb6447017ba616b3714d615de845dbc51c86a10df11b60d9b40bf6afb7066afeb6322408a9b9b4b7aaba5f342
-
SSDEEP
3072:hkANhc8DN9S2EZO7VbEs2yH6LUHQOEeSVILGYRITNVJSYzoy6x6g+D1:hHbRUzIBaL6QWSV6RIpRopxKD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 14060c011567a8d8e189d153410ce8d9
Files
-
14060c011567a8d8e189d153410ce8d9.exe windows:4 windows x86 arch:x86
c25469187d88d0e08ebe3f6cd354315e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetACP
lstrlenA
GetProcAddress
GetModuleHandleA
LoadLibraryA
GetLastError
GetCommandLineW
VirtualAlloc
VirtualAllocEx
GetModuleHandleW
ExitThread
IsBadReadPtr
ExitProcess
user32
EnumChildWindows
IsWindowVisible
SetRect
SetParent
GetCursor
ActivateKeyboardLayout
DestroyWindow
SetScrollRange
DrawIcon
DestroyCursor
UpdateWindow
ReleaseCapture
PeekMessageA
EnableMenuItem
AdjustWindowRectEx
SetWindowLongA
DrawIconEx
CharLowerBuffA
KillTimer
GetMenu
GetDCEx
ClientToScreen
wsprintfA
SetWindowLongW
ShowWindow
SetWindowPlacement
DrawAnimatedRects
LoadIconA
GetDC
TranslateMDISysAccel
IsRectEmpty
IsChild
CallNextHookEx
GetFocus
GetWindowDC
GetClientRect
SetScrollInfo
WaitMessage
SetWindowTextA
CharNextA
GetKeyState
EnumThreadWindows
SendMessageW
DispatchMessageW
InsertMenuA
SetCursor
SetPropA
CreatePopupMenu
BeginPaint
IsZoomed
DrawFrameControl
IsDialogMessageA
CharLowerA
GetKeyboardType
GetScrollInfo
EnumWindows
SetScrollPos
SetMenu
EmptyClipboard
GetClassNameA
FillRect
ScreenToClient
GetCapture
GetActiveWindow
IsDialogMessageW
TranslateMessage
LoadStringA
GetScrollRange
GetSubMenu
UnhookWindowsHookEx
TrackPopupMenu
GetLastActivePopup
GetWindowLongW
ShowOwnedPopups
RemoveMenu
GetMenuItemID
DrawTextA
CloseClipboard
IsWindowEnabled
CharUpperBuffA
GetSystemMenu
DrawEdge
RemovePropA
MapVirtualKeyA
OpenClipboard
GetPropA
GetMenuItemInfoA
CreateIcon
CreateMenu
GetForegroundWindow
EnableScrollBar
ScrollWindow
CallWindowProcA
IsIconic
InvalidateRect
CharToOemA
CharNextW
SendMessageA
GetKeyboardLayout
DefWindowProcA
GetSystemMetrics
DrawMenuBar
LoadBitmapA
DefFrameProcA
MessageBoxA
GetTopWindow
GetKeyNameTextA
DestroyIcon
PtInRect
GetMenuStringA
GetScrollPos
OemToCharA
GetParent
ShowScrollBar
GetWindowLongA
SystemParametersInfoA
OffsetRect
GetKeyboardLayoutList
GetMessagePos
GetMenuState
MoveWindow
comctl32
ImageList_DragShowNolock
ImageList_Add
ImageList_Draw
ImageList_Destroy
ImageList_Read
ImageList_DrawEx
ImageList_GetBkColor
Sections
.text Size: 176KB - Virtual size: 172KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 895B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: 4KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.hdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ