?_xt_vhH@@YGPAMD@Z
Static task
static1
Behavioral task
behavioral1
Sample
16ac9dbac9919317e6a177fc84ab19bf.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
16ac9dbac9919317e6a177fc84ab19bf.exe
Resource
win10v2004-20231215-en
General
-
Target
16ac9dbac9919317e6a177fc84ab19bf
-
Size
174KB
-
MD5
16ac9dbac9919317e6a177fc84ab19bf
-
SHA1
9d32dd9942f472b0db148930d65e12338ff74800
-
SHA256
1601e98aab5b598f043e8f89d0ec4e7ce00885de3682717aaff2fbf7166139ee
-
SHA512
3f5694d95a6efeedd2f85508223a99a487b822a66eca51cafd4b06e6c29bcf76c41ebe353dd0f5dcb3f0eb1e3a49804852646834cbed4e7f26a72c5be6e6cce9
-
SSDEEP
3072:VaMPmwSfBYktQFmrtDvSqE0D1clqyeGmzPyWu8QoA2s0iD6beFM:3OwSnImf0eGmbyW/HAP0/beF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 16ac9dbac9919317e6a177fc84ab19bf
Files
-
16ac9dbac9919317e6a177fc84ab19bf.exe windows:5 windows x86 arch:x86
df39f492a4ebc296a08db25185dfbfb9
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
OpenDesktopW
ModifyMenuW
MonitorFromRect
GetScrollRange
wsprintfA
ActivateKeyboardLayout
ShowCaret
InvalidateRect
SwitchToThisWindow
wsprintfW
DrawIcon
CharLowerA
keybd_event
GrayStringW
IsWindowVisible
IsDialogMessageW
OemToCharBuffA
AttachThreadInput
CharPrevW
LoadAcceleratorsW
GetScrollInfo
UpdateWindow
DefWindowProcW
RemovePropW
ChildWindowFromPoint
PostMessageW
CharNextA
MessageBoxW
shlwapi
PathRelativePathToA
UrlGetPartA
kernel32
GetFileAttributesExW
GetModuleFileNameA
GetFileAttributesA
GetStartupInfoA
lstrlenA
GetModuleFileNameW
CreateWaitableTimerA
VerifyVersionInfoW
GlobalFlags
GetModuleHandleA
GlobalCompact
lstrcmpA
CreateRemoteThread
IsBadCodePtr
GetCommandLineW
GetVersionExW
OpenSemaphoreW
UnlockFile
ntdll
memset
gdi32
GetTextFaceW
LPtoDP
GetClipBox
GetFontData
EndPage
Escape
Ellipse
BeginPath
SetLayout
ScaleWindowExtEx
SetAbortProc
GetObjectW
PtInRegion
WidenPath
comdlg32
ReplaceTextW
CommDlgExtendedError
GetOpenFileNameA
GetSaveFileNameW
GetFileTitleW
msvcrt
exit
Exports
Exports
Sections
.text Size: 163KB - Virtual size: 162KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.itext Size: 512B - Virtual size: 304B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 512B - Virtual size: 296B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.$debug Size: 512B - Virtual size: 99B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data1 Size: 512B - Virtual size: 120B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data2 Size: 512B - Virtual size: 448B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data3 Size: 1024B - Virtual size: 586B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data4 Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 138KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ