Static task
static1
Behavioral task
behavioral1
Sample
121a8bd4ed899e7b45cbc922e033c3b7.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
121a8bd4ed899e7b45cbc922e033c3b7.exe
Resource
win10v2004-20231215-en
General
-
Target
121a8bd4ed899e7b45cbc922e033c3b7
-
Size
62KB
-
MD5
121a8bd4ed899e7b45cbc922e033c3b7
-
SHA1
56ebe4685a6e1dc3f132e051008587cbe9adfa4e
-
SHA256
b04b18a2cdbb9d31aed34fd4daa01cdd42b555a008bb1361f282289efd2136db
-
SHA512
1b25564200c64c29ecc3bb4866ecf805c4ecb5e65489fb83bf52ac8e61207764de7c8f9a22e0497042d31376b2c0512476c453f9888a7f20d82dc8fb50ce577c
-
SSDEEP
768:vqIogxprsQ/F8rQDbxlumUrK888nIWrF0bc2CZ6DD8eoDnc5sxZmUm/XZGkJpfZJ:Loe5sQ8E3vZE16bc2CZ6/+k1GlHA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 121a8bd4ed899e7b45cbc922e033c3b7
Files
-
121a8bd4ed899e7b45cbc922e033c3b7.exe windows:4 windows x86 arch:x86
4d72c37f65758d0615fb7fd7df520450
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
AllocateAndInitializeSid
ChangeServiceConfigA
CloseServiceHandle
DeleteService
OpenSCManagerA
QueryServiceStatus
RegOpenKeyA
UnlockServiceDatabase
kernel32
CloseHandle
CreateFileA
CreateThread
CreateToolhelp32Snapshot
DeviceIoControl
DisableThreadLibraryCalls
EnterCriticalSection
EnumSystemLocalesA
ExitProcess
ExitThread
FindNextFileA
FreeEnvironmentStringsA
FreeLibrary
GetACP
GetCommandLineA
GetCurrentProcess
GetCurrentProcessId
GetEnvironmentStringsA
GetFileTime
GetFullPathNameA
GetLastError
GetLocaleInfoA
GetModuleFileNameA
GetModuleHandleA
GetPrivateProfileSectionNamesA
GetProcAddress
GetProcessHeap
GetStdHandle
GetSystemDirectoryA
GetSystemInfo
GetSystemTimeAsFileTime
GetTempFileNameA
GetThreadTimes
GetTickCount
GetTimeZoneInformation
GetVersionExA
GetWindowsDirectoryA
GlobalAlloc
GlobalFree
GlobalHandle
HeapCreate
HeapDestroy
HeapFree
InitializeCriticalSection
InterlockedDecrement
InterlockedIncrement
LeaveCriticalSection
LoadLibraryA
LoadLibraryExA
LocalAlloc
Module32Next
MulDiv
MultiByteToWideChar
OpenEventA
OpenProcess
OutputDebugStringA
QueryPerformanceCounter
ReadFile
RtlUnwind
SearchPathA
SetCurrentDirectoryA
SetFileAttributesA
SetFilePointer
SetHandleCount
SetStdHandle
SetThreadPriority
SuspendThread
TlsAlloc
TlsSetValue
UnhandledExceptionFilter
UnmapViewOfFile
VirtualAlloc
VirtualFree
VirtualProtect
VirtualQuery
WaitForSingleObject
WriteFile
WritePrivateProfileStringA
lstrcpyA
lstrlenA
user32
ClientToScreen
CreatePopupMenu
DefWindowProcA
DestroyMenu
DestroyWindow
DialogBoxParamA
EndPaint
FindWindowA
GetDC
GetDlgCtrlID
GetDlgItem
GetDlgItemTextA
GetFocus
GetForegroundWindow
GetMenuItemCount
GetMessageA
GetWindowPlacement
IntersectRect
LoadCursorA
LoadImageA
LoadStringA
MessageBoxA
PeekMessageA
PostMessageA
RegisterClassExA
SetDlgItemInt
SetWindowLongA
SetWindowPos
UnregisterClassA
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
Sections
.text Size: 25KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.CRT Size: 15KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 15KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ