Static task
static1
Behavioral task
behavioral1
Sample
1f965fd773df53e58020e9c3b86858bd.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1f965fd773df53e58020e9c3b86858bd.exe
Resource
win10v2004-20231215-en
General
-
Target
1f965fd773df53e58020e9c3b86858bd
-
Size
244KB
-
MD5
1f965fd773df53e58020e9c3b86858bd
-
SHA1
5df0a7684917cb73858fbc6b0be706583d9b6710
-
SHA256
e37d5383a91b93ff9aef90279a50e749bb99a650b4650fe578c31987b78d22e9
-
SHA512
97b45aa109c1de3ed3c1e9b21a87814e763b7bc488e0b1c5a2830feac8e85a74f851af7b2e0e5872c82c30e58f5ba3d67239c119ffa1c2ed37d9ea8954e6e567
-
SSDEEP
6144:JVL2qrwwo5E515Cvc/5XeNfAAXQ5MH5b3XimYT3kjBOKJOM3KqdA:TKJwoarMvWeWpWH5LKY9OM3s
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1f965fd773df53e58020e9c3b86858bd
Files
-
1f965fd773df53e58020e9c3b86858bd.exe windows:4 windows x86 arch:x86
1353b98c8e38f7bc7142e9e4de5c8b46
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
SHGetPathFromIDListW
SHGetSpecialFolderLocation
ShellExecuteW
FindExecutableW
SHBrowseForFolderW
SHGetMalloc
user32
DefWindowProcW
GetWindowWord
SetWindowWord
BeginPaint
GetSysColor
GetClientRect
SetRect
EndPaint
LoadCursorW
GetLastActivePopup
KillTimer
ShowWindow
PostMessageW
SendMessageW
EnableWindow
SetTimer
SetForegroundWindow
RegisterClassW
DialogBoxParamW
SetDlgItemTextW
EndDialog
GetWindowRect
GetSystemMetrics
SetWindowPos
OemToCharA
GetWindowLongW
SetWindowLongW
GetKeyState
PeekMessageW
TranslateMessage
DispatchMessageW
SetCursor
GetParent
SendDlgItemMessageW
GetDlgItem
InvalidateRect
UpdateWindow
MessageBoxW
SetWindowTextW
GetDlgItemTextW
SetActiveWindow
LoadStringW
kernel32
LCMapStringW
LCMapStringA
HeapReAlloc
HeapSize
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
SetEndOfFile
GetConsoleMode
FindFirstFileW
SetCurrentDirectoryW
SetFileTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
LocalAlloc
LoadLibraryA
CreateDirectoryW
GlobalFree
GlobalUnlock
GlobalHandle
GlobalLock
GlobalAlloc
GlobalMemoryStatus
GetVersion
GetVersionExW
GetModuleFileNameW
WriteFile
GetSystemTime
CreateProcessW
LocalFree
CloseHandle
CreateFileW
ExitProcess
FormatMessageW
GetLastError
SetErrorMode
CreateFileA
ReadFile
SetFilePointer
InitializeCriticalSection
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
GetVolumeInformationW
FlushFileBuffers
FindClose
GetConsoleCP
Sleep
LeaveCriticalSection
EnterCriticalSection
SetStdHandle
GetSystemTimeAsFileTime
GetCurrentProcessId
VirtualAlloc
VirtualFree
FileTimeToSystemTime
FileTimeToLocalFileTime
GetFullPathNameW
GetLocalTime
GetProcAddress
GetWindowsDirectoryW
GetCurrentDirectoryW
GetEnvironmentVariableW
GetModuleHandleA
MultiByteToWideChar
WideCharToMultiByte
GetDriveTypeW
HeapFree
GetVersionExA
HeapAlloc
GetProcessHeap
GetStartupInfoW
RtlUnwind
GetFileType
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCommandLineW
SetHandleCount
GetStartupInfoA
DeleteCriticalSection
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
HeapDestroy
HeapCreate
QueryPerformanceCounter
GetTickCount
gdi32
SetTextColor
SetTextAlign
GetBkColor
GetTextExtentPoint32W
ExtTextOutW
CreateDCW
GetDeviceCaps
CreateFontIndirectW
DeleteDC
SelectObject
DeleteObject
SetBkColor
comctl32
ord17
advapi32
RegQueryValueW
Sections
.text Size: 148KB - Virtual size: 144KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 65KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_winzip_ Size: 17.8MB - Virtual size: 17.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ