Static task
static1
Behavioral task
behavioral1
Sample
16280ca0970eefb651580363a6b8b33d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
16280ca0970eefb651580363a6b8b33d.exe
Resource
win10v2004-20231215-en
General
-
Target
16280ca0970eefb651580363a6b8b33d
-
Size
961KB
-
MD5
16280ca0970eefb651580363a6b8b33d
-
SHA1
3db92e2b528754a676192d25669076e96041e9af
-
SHA256
5deb5bb88ee29ac4ae2fff69ba5e15cc6a7cca54b8bc3d4f5b59f009e3dda15c
-
SHA512
9a7619badb176ac05fc79426449120d91463c48bedc2ed4ec622f4648b68d46157bf2af8d2fccc0da770b8980b5038de3665f3f128cf3f96880abefd2711f946
-
SSDEEP
24576:J2u25usIWbFV8N5aHY7CQjcmi+QnTN3vJxdjpaDN:PeusIWVq1CQjcmifnTlv5jEJ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 16280ca0970eefb651580363a6b8b33d
Files
-
16280ca0970eefb651580363a6b8b33d.exe windows:5 windows x86 arch:x86
1072e07292b6d529cf829a92870f3e72
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
wininet
InternetOpenUrlW
InternetCloseHandle
InternetSetStatusCallbackW
HttpQueryInfoW
InternetOpenW
InternetReadFileExA
kernel32
WaitForSingleObject
GetExitCodeProcess
CloseHandle
GetProcAddress
GetModuleHandleW
GetCurrentProcess
LoadLibraryW
WideCharToMultiByte
GetFileAttributesW
GetTempPathW
CreateFileW
ReadFile
WriteFile
SetFilePointer
FindResourceW
LoadResource
LockResource
SizeofResource
GetTempFileNameW
Sleep
InitializeCriticalSection
DeleteCriticalSection
GetModuleFileNameW
DeleteFileW
FormatMessageW
LocalFree
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
CreateFileA
LCMapStringW
LCMapStringA
GetLastError
LoadLibraryA
GetStringTypeW
GetStringTypeA
GetLocaleInfoA
HeapReAlloc
VirtualAlloc
FlushFileBuffers
GetConsoleMode
GetConsoleCP
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
VirtualFree
HeapCreate
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
GetVersionExW
GetModuleFileNameA
LeaveCriticalSection
EnterCriticalSection
MultiByteToWideChar
CreateProcessA
GetModuleHandleA
InitializeCriticalSectionAndSpinCount
ExitProcess
HeapSize
GetCurrentThreadId
SetLastError
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
HeapAlloc
HeapFree
RtlUnwind
RaiseException
GetStartupInfoW
IsDebuggerPresent
InterlockedIncrement
InterlockedDecrement
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
user32
IsWindowVisible
IsWindowEnabled
SendMessageW
IsDialogMessageW
GetWindowLongW
SendDlgItemMessageW
CheckDlgButton
GetCursor
IsDlgButtonChecked
EnableWindow
SetFocus
SetDlgItemTextW
KillTimer
SetTimer
LoadBitmapW
GetDlgItem
FillRect
GetAncestor
ShowWindow
MessageBoxW
DispatchMessageW
TranslateMessage
GetWindowTextW
PostMessageW
GetMessageW
SetWindowPos
DestroyWindow
LoadIconW
CreateDialogParamW
GetDlgItemTextW
DrawTextW
GetClientRect
GetDC
SetPropW
GetParent
SetCursor
LoadCursorW
RemovePropW
SetWindowLongW
CallWindowProcW
GetPropW
SetWindowTextW
EnumChildWindows
gdi32
CreatePatternBrush
GetStockObject
SetBkMode
SelectObject
SetTextColor
CreateFontIndirectW
GetObjectW
advapi32
RegCloseKey
RegSetValueExW
RegCreateKeyExW
RegQueryValueExW
RegOpenKeyExW
shell32
SHBrowseForFolderW
ShellExecuteW
ord190
SHOpenFolderAndSelectItems
ord155
SHGetPathFromIDListW
ShellExecuteExW
SHCreateDirectoryExW
SHGetSpecialFolderPathW
ole32
CoUninitialize
CoCreateInstance
CoTaskMemFree
CoInitializeEx
Sections
.text Size: 104KB - Virtual size: 103KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 806KB - Virtual size: 806KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ