Static task
static1
Behavioral task
behavioral1
Sample
1299b332ee157f3e38a745c02a1b5ded.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1299b332ee157f3e38a745c02a1b5ded.exe
Resource
win10v2004-20231215-en
General
-
Target
1299b332ee157f3e38a745c02a1b5ded
-
Size
540KB
-
MD5
1299b332ee157f3e38a745c02a1b5ded
-
SHA1
db5d0201f55a65e1e29784265d99261899629ff7
-
SHA256
5aeb4b20806b7d0879faa8bde8e8a06988090a001560c17c1a40150513c6a066
-
SHA512
67b681f6a7c2eda3947c6adc0aad234faa6de020d2f05c2764bd409ee4819a3174d479f95988cacbd4d28708485ff552b5406f469b2c1eab07f729c4001dc6c3
-
SSDEEP
6144:3FUXhn3ZGmkguMU6p+/e3SojydKPJJnCCBF+WBq2QEe3hZ6IEgdm:3FUXhn3ZGmkD8p+/mj3LFBq9RxW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1299b332ee157f3e38a745c02a1b5ded
Files
-
1299b332ee157f3e38a745c02a1b5ded.exe windows:4 windows x86 arch:x86
a7e0faf5981c4f2739142ac905cae557
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
TlsFree
lstrcmpA
GlobalFlags
GlobalGetAtomNameA
GetThreadLocale
CloseHandle
GetCurrentThreadId
GetVersionExA
lstrcmpW
LoadLibraryA
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
GetLocaleInfoA
GetCPInfo
GetOEMCP
DeleteCriticalSection
WriteFile
SetFilePointer
FlushFileBuffers
GetCurrentProcess
RtlUnwind
VirtualAlloc
GetSystemTimeAsFileTime
HeapAlloc
HeapFree
RaiseException
HeapReAlloc
GetCommandLineA
GetStartupInfoA
HeapSize
ExitProcess
TerminateProcess
UnhandledExceptionFilter
IsDebuggerPresent
GetACP
GetTimeZoneInformation
VirtualFree
HeapDestroy
HeapCreate
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetConsoleCP
GetConsoleMode
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
LocalReAlloc
TlsSetValue
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
FreeLibrary
InterlockedDecrement
InterlockedIncrement
SetLastError
GlobalLock
FormatMessageA
LocalFree
FindResourceA
LoadResource
LockResource
SizeofResource
GetLastError
GetSystemDirectoryA
Sleep
GetModuleHandleA
GetProcAddress
TlsAlloc
RemoveDirectoryA
CreateFileA
GetLocalTime
GetProcessHeap
SetSystemPowerState
FindFirstChangeNotificationA
FindNextChangeNotification
FindCloseChangeNotification
GetModuleFileNameA
GetFileTime
GetCurrentProcessId
GlobalUnlock
GlobalAlloc
GlobalFree
SetUnhandledExceptionFilter
IsBadReadPtr
lstrlenA
WideCharToMultiByte
CompareStringA
CompareStringW
GetEnvironmentVariableA
MultiByteToWideChar
InterlockedExchange
GetVersion
user32
DrawTextExA
GrayStringA
DestroyMenu
PostQuitMessage
SetPropA
GetPropA
RemovePropA
GetForegroundWindow
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
GetClientRect
GetMenu
PostMessageA
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
CopyRect
DefWindowProcA
CallWindowProcA
IsIconic
DrawTextA
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
EnableMenuItem
CheckMenuItem
SetWindowPos
SetWindowLongA
IsWindow
GetDlgItem
SetWindowsHookExA
CallNextHookEx
DispatchMessageA
GetKeyState
ValidateRect
UnregisterClassA
GetFocus
GetWindow
GetDlgCtrlID
GetWindowRect
GetClassNameA
PtInRect
GetWindowTextA
SetWindowTextA
SystemParametersInfoA
ClientToScreen
RegisterClassExA
GetWindowTextLengthA
SetForegroundWindow
CheckRadioButton
SendDlgItemMessageA
IsClipboardFormatAvailable
SendMessageA
SetClipboardData
TabbedTextOutA
RegisterWindowMessageA
LoadIconA
WinHelpA
GetCapture
GetWindowPlacement
GetClassLongA
GetWindowThreadProcessId
GetParent
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
EnableWindow
MessageBoxA
UnhookWindowsHookEx
LoadCursorA
GetSystemMetrics
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
IsDlgButtonChecked
SetDlgItemTextA
DestroyIcon
GetKeyNameTextA
PeekMessageA
gdi32
TextOutA
DeleteObject
CreateBitmap
GetClipBox
SetTextColor
SetBkColor
SaveDC
RestoreDC
GetStockObject
SetMapMode
SelectObject
StretchBlt
SetPixel
GetTextExtentPoint32A
PatBlt
GetBkColor
CreateSolidBrush
DeleteDC
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
Escape
GetDeviceCaps
RectVisible
PtVisible
ExtTextOutA
winspool.drv
DeletePrinterConnectionA
OpenPrinterA
DocumentPropertiesA
ClosePrinter
ole32
CoTaskMemFree
CoCreateInstance
CoUninitialize
CoInitialize
CoTaskMemAlloc
avifil32
AVIFileInit
AVIStreamFindSample
AVIStreamTimeToSample
AVIStreamRelease
AVIFileExit
oleaut32
VariantClear
VariantChangeType
VariantInit
oleacc
LresultFromObject
CreateStdAccessibleObject
Sections
.text Size: 288KB - Virtual size: 287KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 36KB - Virtual size: 93KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 160KB - Virtual size: 159KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ