Static task
static1
Behavioral task
behavioral1
Sample
1708786a3b19d4b6d4d8ea8fd377d193.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1708786a3b19d4b6d4d8ea8fd377d193.exe
Resource
win10v2004-20231215-en
General
-
Target
1708786a3b19d4b6d4d8ea8fd377d193
-
Size
85KB
-
MD5
1708786a3b19d4b6d4d8ea8fd377d193
-
SHA1
302ae4c91b32b53deb0984e779a72e3895c3f11c
-
SHA256
58d5f6e89ceb5d0020af14d5da41c8e87ceb01d652590f82ccc1eb935d251947
-
SHA512
30fee7d4d15903365638bafde293fa791098de860bb4b6e8a8e72c8494b05fd041638147f4c010b1674242a237f715191c3161e4e03c656d7b8a82840fa8cfcb
-
SSDEEP
1536:jQxpjtT8Nz3HvPq707UHSW6alclV666Q8GHcTqb+d2Kmrkju/WNAHnJoEjexlXC:uT8tHvPq7jtJlclV7zbcTqb+d2Kmrkje
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1708786a3b19d4b6d4d8ea8fd377d193
Files
-
1708786a3b19d4b6d4d8ea8fd377d193.exe windows:4 windows x86 arch:x86
aa63262a51ced48e4eb3425d55979426
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LocalAlloc
GetTempPathA
GetModuleFileNameA
GetShortPathNameA
GetVersionExA
CompareStringW
CompareStringA
GetOEMCP
GetACP
GetCPInfo
GetStringTypeW
GetStringTypeA
GetTimeZoneInformation
RtlUnwind
LocalFree
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
CreateProcessA
FreeEnvironmentStringsA
UnhandledExceptionFilter
LCMapStringW
LCMapStringA
MultiByteToWideChar
WideCharToMultiByte
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
FreeLibrary
LoadLibraryA
GetProcAddress
GetExitCodeProcess
GetCurrentDirectoryA
GetFileType
SetCurrentDirectoryA
lstrcatA
lstrlenA
WinExec
CloseHandle
SetFilePointer
GetSystemDirectoryA
WriteFile
ReadFile
CreateFileA
GetLastError
GetEnvironmentVariableA
GetVersion
GetCommandLineA
GetStartupInfoA
GetModuleHandleA
FileTimeToLocalFileTime
FileTimeToSystemTime
FindClose
GetWindowsDirectoryA
FreeEnvironmentStringsW
SetFileAttributesA
GetFileAttributesA
ExitProcess
TerminateProcess
GetCurrentProcess
HeapCompact
HeapAlloc
HeapReAlloc
HeapFree
RemoveDirectoryA
DeleteFileA
FindFirstFileA
FindNextFileA
SetEnvironmentVariableA
user32
SendMessageA
GetWindow
GetSystemMetrics
CreateWindowExA
LoadIconA
LoadCursorA
RegisterClassA
CreateDialogParamA
GetDlgItem
DestroyWindow
PostQuitMessage
DefWindowProcA
CharToOemA
DialogBoxParamA
EndDialog
SetDlgItemTextA
TranslateMessage
DispatchMessageA
GetMessageA
IsDialogMessageA
SetWindowLongA
SetWindowTextA
MessageBoxA
wsprintfA
PeekMessageA
gdi32
DeleteObject
RemoveFontResourceA
GetObjectA
CreateFontIndirectA
GetStockObject
advapi32
RegSetValueExA
RegQueryValueExA
RegEnumKeyExA
RegDeleteKeyA
RegDeleteValueA
RegOpenKeyExA
RegQueryValueA
RegOpenKeyA
RegCloseKey
shell32
SHGetPathFromIDListA
ShellExecuteA
SHGetSpecialFolderLocation
SHGetMalloc
ole32
OleUninitialize
OleInitialize
comctl32
ord17
Sections
.text Size: 36KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ