Static task
static1
Behavioral task
behavioral1
Sample
1961a611eeee8e0db27d2dba9459165b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1961a611eeee8e0db27d2dba9459165b.exe
Resource
win10v2004-20231215-en
General
-
Target
1961a611eeee8e0db27d2dba9459165b
-
Size
122KB
-
MD5
1961a611eeee8e0db27d2dba9459165b
-
SHA1
8ecf2ee309a6683d78b74e55866b863901ac71a7
-
SHA256
78662726559c65e11cd433c12253a9d626c5c7c4fa4a573298056c3028c7f6e9
-
SHA512
51a93936af184fd0bafef23c98a660a0d39a8dbad050bb1c41479d264b22e8765188008a55113367fd1d6cbdf8ccd8df8980dba3cbb1324d659ac0692d27eb97
-
SSDEEP
3072:S6rDfJHr4AKHUXnar+Y07cKG7DdFtG6xSMtn3Z:S6ffJHr4AKHUKr+Y07cKIDdF0eJ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1961a611eeee8e0db27d2dba9459165b
Files
-
1961a611eeee8e0db27d2dba9459165b.exe windows:4 windows x86 arch:x86
937cc96ef3cef8a939703679fde137e7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleFileNameA
GetCurrentThreadId
GetVersionExA
CloseHandle
GetCurrentProcessId
WriteFile
GetLastError
SetLastError
GetProcAddress
LoadLibraryA
GetCurrentDirectoryA
GetFileSize
lstrcmpA
SetFilePointer
Process32First
GlobalLock
OpenProcess
GlobalAlloc
TerminateThread
Sleep
CreateSemaphoreA
TerminateProcess
ReadFile
GlobalUnlock
SetCurrentDirectoryA
FindFirstFileA
SetFileAttributesA
GlobalFree
FindClose
Process32Next
FindNextFileA
CreateToolhelp32Snapshot
DeleteFileA
CreateThread
MapViewOfFile
FlushViewOfFile
CopyFileA
CreateFileMappingA
GetDiskFreeSpaceA
WideCharToMultiByte
MultiByteToWideChar
WaitForSingleObject
GetWindowsDirectoryA
CreateProcessA
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
SetEndOfFile
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
FlushFileBuffers
SetStdHandle
GetOEMCP
GetACP
GetCPInfo
GetConsoleMode
GetConsoleCP
GetTickCount
CreateFileA
CreateDirectoryA
RaiseException
GetCurrentProcess
UnmapViewOfFile
QueryPerformanceCounter
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
RtlUnwind
HeapSize
InterlockedDecrement
InterlockedIncrement
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetStdHandle
ExitProcess
GetModuleHandleA
HeapReAlloc
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetStartupInfoA
GetProcessHeap
HeapFree
HeapAlloc
GetSystemTimeAsFileTime
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCommandLineA
user32
mouse_event
LoadCursorA
FindWindowA
UpdateWindow
IsWindowVisible
DispatchMessageA
PostMessageA
EnumChildWindows
GetCursorPos
DefWindowProcA
RegisterClassA
SetCursorPos
GetWindowTextA
TranslateMessage
IsWindowEnabled
LoadIconA
GetWindowRect
SetTimer
GetClassNameA
GetMessageA
DestroyWindow
CreateWindowExA
CreateDesktopA
CloseDesktop
SetWindowPos
ShowWindow
SetThreadDesktop
gdi32
GetStockObject
advapi32
RegCloseKey
RegOpenKeyA
RegSetValueExA
shell32
ShellExecuteA
wininet
InternetOpenUrlA
InternetCloseHandle
HttpQueryInfoA
InternetOpenA
InternetReadFile
ws2_32
send
connect
gethostbyname
closesocket
socket
recv
WSACleanup
htons
inet_addr
WSAStartup
inet_ntoa
Sections
.text Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ