Static task
static1
Behavioral task
behavioral1
Sample
14431105c10c3faadada6d9e2c47a3db.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
14431105c10c3faadada6d9e2c47a3db.exe
Resource
win10v2004-20231215-en
General
-
Target
14431105c10c3faadada6d9e2c47a3db
-
Size
98KB
-
MD5
14431105c10c3faadada6d9e2c47a3db
-
SHA1
0c5ad93e686b1f196c8a8c2989c4e97c6ae187c1
-
SHA256
8ac0d71c64845bd458fa6d9a56e7fcee29389ec189d2c396462f242496a17d08
-
SHA512
71621c791f7e4660110fab5fa93561bbcc25b2d53d11f4d9011f09c9e9a0d10f895ce124163f86a3de931898220455b1ea6565f3c4e0d6f1cafa7e4f8cc97110
-
SSDEEP
1536:U4mrWUHrzMsZ0nypsHGmM4SN0v6DcLXJQUB1z6bbQt+2i2u+DFDytp:UrfrzMs2y4GuwATH5ta/4Dk
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 14431105c10c3faadada6d9e2c47a3db
Files
-
14431105c10c3faadada6d9e2c47a3db.exe windows:4 windows x86 arch:x86
f1e1e43e7697f50362aee441e478bce0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
version
VerInstallFileA
GetFileVersionInfoA
user32
MoveWindow
SetWindowLongW
EndPaint
EmptyClipboard
DestroyMenu
DrawTextA
IsZoomed
GetMenuStringA
WindowFromPoint
GetClassLongA
InsertMenuA
GetCursor
CharLowerBuffA
SystemParametersInfoA
GetWindow
RegisterClassA
GetCapture
UpdateWindow
EnumChildWindows
CreateIcon
GetMenuState
InvalidateRect
ShowWindow
CloseClipboard
GetClassNameA
OemToCharA
RegisterClipboardFormatA
LoadKeyboardLayoutA
GetWindowRect
OffsetRect
SendMessageA
GetActiveWindow
oleaut32
SafeArrayGetElement
SafeArrayGetUBound
OleLoadPicture
SysStringLen
RegisterTypeLib
GetErrorInfo
SysReAllocStringLen
SafeArrayPtrOfIndex
SysFreeString
SafeArrayUnaccessData
msvcrt
calloc
strcmp
pow
fabs
memcpy
cos
comdlg32
ChooseColorA
FindTextA
GetSaveFileNameA
GetFileTitleA
shell32
SHGetDiskFreeSpaceA
Shell_NotifyIconA
SHGetDesktopFolder
advapi32
RegCreateKeyExA
shlwapi
SHGetValueA
PathIsContentTypeA
PathGetCharTypeA
SHStrDupA
SHDeleteValueA
kernel32
LoadLibraryExA
GetVersion
GetCurrentProcess
FormatMessageA
GetCurrentThreadId
GetProcAddress
GetStringTypeA
GetSystemDefaultLangID
ReadFile
GetCurrentProcessId
FindResourceA
LocalReAlloc
GetEnvironmentStrings
VirtualAllocEx
WideCharToMultiByte
SetEndOfFile
GetCurrentThread
FreeResource
GetFullPathNameA
GetCommandLineA
SizeofResource
SetErrorMode
ExitThread
FindClose
GetUserDefaultLCID
FindFirstFileA
VirtualAlloc
GetACP
CreateFileA
Sleep
lstrcmpiA
GetLocalTime
GetStartupInfoA
CompareStringA
HeapFree
GetThreadLocale
SetThreadLocale
GetProcessHeap
HeapAlloc
SetHandleCount
LoadLibraryA
CloseHandle
SetEvent
lstrcpynA
DeleteCriticalSection
GetModuleHandleA
VirtualFree
EnterCriticalSection
Sections
CODE Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 428B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DATA Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ