Static task
static1
Behavioral task
behavioral1
Sample
1984e0cbf0666d5f57f6dedd133fdfe0.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1984e0cbf0666d5f57f6dedd133fdfe0.exe
Resource
win10v2004-20231215-en
General
-
Target
1984e0cbf0666d5f57f6dedd133fdfe0
-
Size
712KB
-
MD5
1984e0cbf0666d5f57f6dedd133fdfe0
-
SHA1
59ab2e441e0da110b76fd516dd67d158afe3d806
-
SHA256
6c632e46f7e38566a11ac76e83f6a27bd9793fe51264c4e2c934c3cdbeb94409
-
SHA512
8d2862d5550c6e3601a96f358639caea99617e25098a008e656bc594e9e4e0c006bf75c90758e079e4d8997f8a6223308ea2c880aeb12e9ca919a74ac6b598e8
-
SSDEEP
12288:eUWeSwc6IlC67mwns2HlA/TzEi/gHUAnoZkFYyjBmyZou4TuhZqa:NywcpXmwnHs/gaSFYy9f4T1a
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1984e0cbf0666d5f57f6dedd133fdfe0
Files
-
1984e0cbf0666d5f57f6dedd133fdfe0.exe windows:4 windows x86 arch:x86
906c270ef1118e8b8d73dc2dda117abe
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
version
VerQueryValueA
GetFileVersionInfoSizeA
GetFileVersionInfoA
shlwapi
PathIsUNCA
SHGetValueA
PathFileExistsA
PathRemoveExtensionA
PathStripToRootA
PathFindExtensionA
PathFindFileNameA
StrToIntA
advapi32
RegCloseKey
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegEnumKeyA
RegQueryValueA
RegCreateKeyExA
SetSecurityDescriptorDacl
RegOpenKeyA
RegDeleteKeyA
kernel32
GlobalGetAtomNameA
CreateSemaphoreA
ReleaseSemaphore
InterlockedIncrement
InterlockedDecrement
GetVersionExA
lstrcmpW
GlobalFindAtomA
GetModuleFileNameW
FindNextFileA
FileTimeToSystemTime
FileTimeToLocalFileTime
TlsGetValue
GlobalReAlloc
GlobalHandle
InitializeCriticalSection
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
WritePrivateProfileStringA
GetCurrentDirectoryA
GlobalFlags
SetErrorMode
GetFileAttributesA
GetFileTime
GetCPInfo
GetOEMCP
RtlUnwind
GetFullPathNameA
HeapFree
HeapAlloc
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
HeapReAlloc
GetCommandLineA
GetProcessHeap
GetStartupInfoA
WriteConsoleW
GetFileType
GetStdHandle
ExitThread
CreateThread
HeapSize
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapDestroy
HeapCreate
VirtualFree
GetConsoleCP
GetConsoleMode
Sleep
GetTimeZoneInformation
GetACP
LCMapStringA
LCMapStringW
SetHandleCount
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
DebugBreak
GetDriveTypeA
WriteConsoleA
GetConsoleOutputCP
SetStdHandle
GetStringTypeA
GetStringTypeW
SetEnvironmentVariableA
FindFirstFileA
FindClose
DuplicateHandle
GetThreadLocale
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
DeleteFileA
GetCurrentProcessId
GlobalAddAtomA
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
lstrcmpA
GlobalDeleteAtom
GetModuleHandleA
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
MulDiv
CreateEventA
SuspendThread
SetEvent
WaitForSingleObject
ResumeThread
SetThreadPriority
RaiseException
LocalAlloc
SetFilePointer
WriteFile
ReadFile
CreateFileA
FreeResource
LocalFree
GetCurrentProcess
SetPriorityClass
DeviceIoControl
CreateMutexA
GetCurrentThreadId
SetLastError
GetVolumeInformationA
CopyFileA
GetTempFileNameA
EnterCriticalSection
LeaveCriticalSection
ExitProcess
GetModuleFileNameA
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
FreeLibrary
lstrlenA
lstrcmpiA
CompareStringA
CompareStringW
MultiByteToWideChar
InterlockedExchange
GetVersion
WideCharToMultiByte
LoadResource
LockResource
SizeofResource
FindResourceA
DosDateTimeToFileTime
LocalFileTimeToFileTime
CompareFileTime
SystemTimeToFileTime
CloseHandle
SetFileTime
GetTempPathA
LoadLibraryA
GetProcAddress
GetLastError
GetSystemTimeAsFileTime
CreateDirectoryA
user32
DestroyMenu
UnregisterClassA
ShowWindow
IsDialogMessageA
LoadIconA
SendDlgItemMessageA
WinHelpA
GetCapture
GetClassLongA
SetPropA
GetPropA
RemovePropA
SetFocus
GetForegroundWindow
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
UpdateWindow
GetMenu
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
GetSysColor
AdjustWindowRectEx
EndPaint
PtInRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetWindowLongA
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetWindow
GetDesktopWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
GetDlgItem
GetNextDlgTabItem
EndDialog
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
MessageBoxA
SetCursor
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
ModifyMenuA
EnableMenuItem
CheckMenuItem
PostQuitMessage
GetMenuState
GetMenuItemID
GetMenuItemCount
BeginPaint
GrayStringA
DrawTextExA
DrawTextA
GetSubMenu
TabbedTextOutA
ClientToScreen
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
IsWindowVisible
SendMessageA
GetKeyState
PeekMessageA
ValidateRect
wsprintfA
GetParent
GetClassNameA
GetSystemMetrics
WaitForInputIdle
EnumThreadWindows
EnumChildWindows
SendMessageTimeoutA
GetClientRect
SetWindowTextA
GetWindowThreadProcessId
BringWindowToTop
EnableWindow
SetParent
SetTimer
PostMessageA
RegisterWindowMessageA
EnumWindows
GetWindowTextA
GetCursorPos
CharUpperA
LoadCursorA
GetDC
ReleaseDC
CopyRect
GetSysColorBrush
IsWindow
gdi32
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
SetTextColor
GetStockObject
ExtTextOutA
GetClipBox
CreateBitmap
DeleteDC
GetDeviceCaps
TextOutA
RectVisible
PtVisible
SetMapMode
RestoreDC
SaveDC
DeleteObject
GetObjectA
SetBkColor
Escape
comdlg32
GetFileTitleA
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
ole32
OleRun
CoInitialize
CoCreateInstance
CoGetMalloc
CoUninitialize
CoInitializeEx
CoDisconnectObject
oleaut32
LoadTypeLi
SysFreeString
VariantClear
SysAllocString
SysAllocStringLen
VariantCopy
VariantInit
GetErrorInfo
VariantChangeType
SysStringLen
SysAllocStringByteLen
Sections
.text Size: 584KB - Virtual size: 583KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 108KB - Virtual size: 104KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 127KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 620B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ