Static task
static1
Behavioral task
behavioral1
Sample
104b6144a9b1dc492b1bc7868c07aef4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
104b6144a9b1dc492b1bc7868c07aef4.exe
Resource
win10v2004-20231215-en
General
-
Target
104b6144a9b1dc492b1bc7868c07aef4
-
Size
159KB
-
MD5
104b6144a9b1dc492b1bc7868c07aef4
-
SHA1
77d11404e2323ed95f299305cefa422f2b0a009c
-
SHA256
75fb901e00757e5544cab7b6dc4f325cfbe8503ade5de1de5f53fbce5ee12449
-
SHA512
5bbb52f729f47fea59c49dbd12c9c9545f47732180022fba8b72ce81695764c8947921a0ee5ef4606e6d54e6bdbc11a5d81591927684affc529304d5aed0bfad
-
SSDEEP
3072:c+1z6IkSvOVLx4LINvr7Qk8f6NqcJJ4AqAGsjKAC5LgFB:ccuIrO5xD1r6c45
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 104b6144a9b1dc492b1bc7868c07aef4
Files
-
104b6144a9b1dc492b1bc7868c07aef4.exe windows:4 windows x86 arch:x86
f2fd35c57fb1803a1b2d7f1243cd09aa
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
time
clock
sqrt
wcstol
wcschr
strlen
wcscspn
memcpy
srand
mbstowcs
memmove
_acmdln
user32
CreateMenu
GetClassLongA
SetWindowTextA
GetMenuItemInfoA
EnableMenuItem
MessageBoxA
CallWindowProcA
EnumThreadWindows
GetCursorPos
GetLastActivePopup
CallNextHookEx
BeginDeferWindowPos
DispatchMessageW
IsWindowEnabled
GetScrollRange
DrawIcon
GetDCEx
GetFocus
GetSysColorBrush
RegisterClassA
GetMenuState
GetClipboardData
IsMenu
DispatchMessageA
GetClassInfoA
DrawFrameControl
IsDialogMessageA
GetScrollPos
CharLowerA
DefFrameProcA
GetMenuItemID
GetWindow
GetDesktopWindow
GetDC
SystemParametersInfoA
DefMDIChildProcA
SetCursor
EndPaint
GetSubMenu
GetParent
EnableWindow
GetWindowTextA
GetCursor
DefWindowProcA
DeferWindowPos
ClientToScreen
CreateWindowExA
CharLowerBuffA
CreatePopupMenu
SetTimer
GetActiveWindow
SetWindowLongA
GetKeyState
GetScrollInfo
CharNextA
EndDeferWindowPos
GetSubMenu
EnableMenuItem
CharLowerBuffA
CreateIcon
CreatePopupMenu
EndPaint
EnableScrollBar
FillRect
GetCapture
GetClipboardData
GetKeyState
GetClassLongA
BeginDeferWindowPos
CallWindowProcA
GetMenuItemCount
GetMenu
DefWindowProcA
GetMenuStringA
GetParent
GetSysColor
DrawIcon
DispatchMessageA
GetActiveWindow
DefMDIChildProcA
GetMenuState
CharLowerA
GetMenuItemInfoA
TrackPopupMenu
ShowWindow
IsWindowEnabled
CheckMenuItem
DrawIconEx
IsDialogMessageA
DrawMenuBar
GetCursor
GetForegroundWindow
GetScrollRange
GetSysColorBrush
RegisterClassA
IsWindowVisible
DrawTextA
SetWindowTextA
GetClassInfoA
GetPropA
GetMessagePos
GetMenuItemID
DrawFrameControl
BeginPaint
SystemParametersInfoA
EnumChildWindows
FrameRect
CreateWindowExA
CharNextA
SetWindowLongA
EqualRect
GetCursorPos
GetWindow
CreateMenu
FindWindowA
GetDesktopWindow
comdlg32
ChooseColorA
GetOpenFileNameA
GetFileTitleA
GetFileTitleA
FindTextA
GetOpenFileNameA
ChooseColorA
GetSaveFileNameA
version
GetFileVersionInfoSizeA
advapi32
RegCreateKeyA
GetUserNameA
RegQueryInfoKeyA
GetLengthSid
shell32
SHGetSpecialFolderLocation
SHGetFileInfoA
SHGetDiskFreeSpaceA
comctl32
ImageList_Create
ImageList_Read
ImageList_Draw
ImageList_Write
ImageList_Remove
oleaut32
SysFreeString
SysReAllocStringLen
SysStringLen
VariantCopyInd
SysReAllocStringLen
SysStringLen
SafeArrayGetUBound
RegisterTypeLib
SafeArrayCreate
kernel32
GetCurrentThreadId
CreateFileA
VirtualFree
FreeLibrary
MoveFileExA
GetCurrentThread
SetErrorMode
InitializeCriticalSection
LocalFree
GetVersion
EnumCalendarInfoA
SetEvent
GetCurrentProcess
GetDiskFreeSpaceA
GetTickCount
SetThreadLocale
VirtualQuery
WideCharToMultiByte
HeapDestroy
lstrcmpiA
SetLastError
GetStdHandle
LoadResource
LoadLibraryA
DeleteCriticalSection
GetOEMCP
FormatMessageA
GetVersionExA
GetFileSize
RaiseException
LocalReAlloc
FindResourceA
GetFileAttributesA
GetLocaleInfoA
CompareStringA
FindFirstFileA
GetACP
VirtualAlloc
FindClose
GetThreadLocale
lstrcatA
Sleep
MulDiv
GetCommandLineA
GetStartupInfoA
HeapFree
GetEnvironmentStrings
LockResource
GetModuleFileNameA
LoadLibraryExA
GetFullPathNameA
SetFilePointer
CloseHandle
GlobalDeleteAtom
GetProcAddress
GetStringTypeW
ExitThread
GetModuleHandleA
GetCurrentProcessId
DeleteFileA
GetCPInfo
CreateEventA
SetEndOfFile
lstrcpynA
GetFileType
lstrlenA
WaitForSingleObject
GetLocalTime
ExitProcess
GlobalAlloc
HeapAlloc
ReadFile
EnterCriticalSection
WriteFile
GetProcessHeap
VirtualAllocEx
CreateThread
SizeofResource
gdi32
GetObjectA
GetDIBits
GetDCOrgEx
BitBlt
SetTextColor
ole32
CoRegisterClassObject
CoTaskMemFree
CoGetContextToken
CoRevokeClassObject
CoCreateInstanceEx
shlwapi
SHStrDupA
SHDeleteValueA
SHEnumValueA
PathGetCharTypeA
ntdll
_wcsnicmp
wcscat
RtlDeleteCriticalSection
atoi
atol
Sections
CODE Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.edata Size: 120KB - Virtual size: 119KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
DATA Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.init Size: 1024B - Virtual size: 746B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ