Static task
static1
Behavioral task
behavioral1
Sample
16083c29d7d898bbe825e1a192c03fdd.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
16083c29d7d898bbe825e1a192c03fdd.exe
Resource
win10v2004-20231215-en
General
-
Target
16083c29d7d898bbe825e1a192c03fdd
-
Size
133KB
-
MD5
16083c29d7d898bbe825e1a192c03fdd
-
SHA1
6de1f68e3253e8bc3a2cf16e4c14ec93a45bc682
-
SHA256
ed8ddcc11f01442c9f25ad2be12ecd58fd4332340a1026154f4a1437b9db898a
-
SHA512
8a44601b4db5367590f73a5a6bd9367ae362d196d27c4b9057170f89e77af5a8e7a9f86a70af4cb9d927520743030edde79404272f7f62cca754a892f30a5ed1
-
SSDEEP
768:JFvx5vTUjMS0nYmMFdjkqv//DarWNxKXIIQMwmkAGDjJ9FCfRD6XslDu1JkaUPvJ:J35vTUfwclIdct9GRDuku8Z3Qg
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 16083c29d7d898bbe825e1a192c03fdd
Files
-
16083c29d7d898bbe825e1a192c03fdd.exe windows:5 windows x86 arch:x86
cf03f9d5cfc7808a003774c02be66791
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
Thread32First
Sleep
Thread32Next
GetProcAddress
VirtualAllocEx
GetPrivateProfileStringA
LoadLibraryA
OpenThread
Process32Next
GetModuleHandleA
CreateToolhelp32Snapshot
CloseHandle
WriteProcessMemory
ResumeThread
Process32First
GetPrivateProfileIntA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetStartupInfoA
InterlockedCompareExchange
InterlockedExchange
FreeLibrary
GetFullPathNameA
OpenProcess
CreateRemoteThread
CreateThread
ExitProcess
user32
GetMessageA
PostQuitMessage
LoadBitmapA
LoadIconA
SendMessageA
TranslateMessage
CreateWindowExA
DefWindowProcA
ShowWindow
DispatchMessageA
GetSystemMetrics
LoadCursorA
RegisterClassA
DestroyWindow
gdi32
CreateSolidBrush
CreateFontA
advapi32
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenProcessToken
shell32
ShellExecuteA
msvcp90
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDI@Z
?erase@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@II@Z
??Y?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@D@Z
msvcr90
__p__fmode
_controlfp_s
_invoke_watson
_except_handler4_common
sprintf_s
calloc
fopen_s
rand
srand
strrchr
realloc
fclose
_time64
_amsg_exit
__getmainargs
_cexit
_exit
_XcptFilter
_ismbblead
exit
_acmdln
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_adjust_fdiv
__p__commode
__CxxFrameHandler3
_encode_pointer
__set_app_type
_crt_debugger_hook
?terminate@@YAXXZ
_unlock
__dllonexit
_lock
_onexit
_decode_pointer
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 928B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 120KB - Virtual size: 119KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ