Static task
static1
Behavioral task
behavioral1
Sample
1d8974b3d9567faeac769347770f0515.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1d8974b3d9567faeac769347770f0515.exe
Resource
win10v2004-20231215-en
General
-
Target
1d8974b3d9567faeac769347770f0515
-
Size
508KB
-
MD5
1d8974b3d9567faeac769347770f0515
-
SHA1
cbebef4c07e601e7a59debc1a19e142cd3b1347e
-
SHA256
c1b23c3013e14c047fb83baa4ce2da4d972bbb53127095265cdad5786bb54f3f
-
SHA512
e0905bfa3a7094ddb5fd30fa1de26fa142437b1764d81f2684959dc325a42c337f2a922749c430ae6544964c268987d9f054f4ab89ad7818a2ce19deef465817
-
SSDEEP
12288:G9u6Q+rDnwXgYbL24kQpYRd9F8nnMkQ62ZTwdPTBKW58z3vJIcTkoDt:bMkv8W5ovJIcThD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1d8974b3d9567faeac769347770f0515
Files
-
1d8974b3d9567faeac769347770f0515.exe windows:4 windows x86 arch:x86
518a00a06e537efa2b132b6a0b6981a9
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
RemoveDirectoryA
DeviceIoControl
GetVersionExA
CreateDirectoryA
GetWindowsDirectoryA
GetProcessHeap
GetFullPathNameA
FormatMessageA
GetShortPathNameA
GetLocaleInfoA
CompareStringW
CompareStringA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
GetConsoleMode
GetConsoleCP
QueryPerformanceCounter
GetEnvironmentStringsW
CreateEventA
GetEnvironmentStrings
FreeEnvironmentStringsA
HeapSize
GetFileType
SetHandleCount
GetStringTypeW
GetStringTypeA
GetStdHandle
ExitProcess
HeapReAlloc
CreateProcessA
VirtualFree
LCMapStringW
LCMapStringA
SetLastError
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
IsValidCodePage
GetOEMCP
GetCPInfo
GetStartupInfoA
GetCommandLineA
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RaiseException
GetDateFormatA
GetTimeFormatA
GetDriveTypeA
FileTimeToLocalFileTime
FileTimeToSystemTime
CreateThread
ExitThread
GetSystemTimeAsFileTime
RtlUnwind
SetEvent
GetSystemTime
ResumeThread
CopyFileA
TerminateThread
DeleteCriticalSection
GetFileTime
SetFileTime
SetEnvironmentVariableA
OutputDebugStringA
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
SetEndOfFile
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetFileSize
GetCurrentDirectoryA
SetCurrentDirectoryA
FindFirstFileA
GetFileAttributesA
FlushFileBuffers
ReleaseMutex
CreateMutexA
TerminateProcess
OpenProcess
GetCurrentProcess
GetACP
GetComputerNameA
GetTimeZoneInformation
GetModuleHandleA
GetVolumeInformationA
HeapDestroy
HeapCreate
HeapFree
HeapAlloc
GetCurrentProcessId
GetCurrentThreadId
GetModuleFileNameA
InterlockedIncrement
lstrlenA
WideCharToMultiByte
VirtualAlloc
InterlockedDecrement
SetFileAttributesA
FindNextFileA
FindClose
WaitForSingleObject
Sleep
FreeLibrary
GetLastError
LoadLibraryA
GetProcAddress
LocalFree
MoveFileA
DeleteFileA
GetVersion
GetSystemDirectoryA
GetTickCount
MultiByteToWideChar
WriteFile
CreateFileA
ReadFile
SetFilePointer
CloseHandle
FreeEnvironmentStringsW
VirtualProtect
user32
PostThreadMessageA
KillTimer
DispatchMessageA
TranslateMessage
GetMessageA
SetTimer
GetCursorPos
wsprintfA
GetForegroundWindow
ExitWindowsEx
GetSystemMetrics
CreateDialogParamA
UpdateWindow
ShowWindow
IsWindow
EndDialog
PostQuitMessage
SetCursor
MessageBoxA
LoadStringA
DestroyWindow
LoadIconA
LoadCursorA
RegisterClassA
CreateWindowExA
PostMessageA
UnregisterClassA
GetPropA
SetPropA
DefWindowProcA
GetDC
ReleaseDC
gdi32
GetStockObject
GetDeviceCaps
advapi32
RegDeleteValueA
RegSetKeySecurity
RegOpenKeyExA
RegGetKeySecurity
RegCloseKey
GetTokenInformation
GetSecurityInfo
SetEntriesInAclA
SetSecurityInfo
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
GetUserNameA
RegCreateKeyExA
RegDeleteKeyA
RegEnumKeyExA
RegQueryValueExA
RegEnumValueA
DeregisterEventSource
CloseServiceHandle
OpenServiceA
OpenSCManagerA
StartServiceA
QueryServiceStatus
ControlService
SetServiceStatus
ReportEventA
RegisterEventSourceA
DeleteService
RegCreateKeyA
CreateServiceA
RegisterServiceCtrlHandlerA
StartServiceCtrlDispatcherA
InitiateSystemShutdownA
RegConnectRegistryA
RegSetValueExA
shell32
SHGetMalloc
SHGetSpecialFolderLocation
SHGetPathFromIDListA
ole32
StringFromCLSID
CoInitialize
CoCreateInstance
CoInitializeEx
CoUninitialize
CoTaskMemFree
oleaut32
SysAllocStringLen
SysFreeString
SysAllocString
Sections
.text Size: 292KB - Virtual size: 291KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 172KB - Virtual size: 169KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 392B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ