Static task
static1
Behavioral task
behavioral1
Sample
006ae1dc7d37b9e99b00fb16062a98d3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
006ae1dc7d37b9e99b00fb16062a98d3.exe
Resource
win10v2004-20231215-en
General
-
Target
006ae1dc7d37b9e99b00fb16062a98d3
-
Size
1.3MB
-
MD5
006ae1dc7d37b9e99b00fb16062a98d3
-
SHA1
d0f37fb08bbf3aac58bc618c28146861c8844870
-
SHA256
dbde49e802d264de8e493e131938a8185762a015134a4a5715d697918412cd1b
-
SHA512
1a3a7063db40b1b775c2b18dd9678778339d6e18752dbbc193505b6968798e723f7812bec8cc302b251b49b10f17b6065fd4573efbceb4b3dfc662a2723f28f0
-
SSDEEP
24576:zXWs5Z/q/A/wChzUFTzatnWuMxb/votfG7EGLKCONiBnhlH:zXuVuMRF7wAl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 006ae1dc7d37b9e99b00fb16062a98d3
Files
-
006ae1dc7d37b9e99b00fb16062a98d3.exe windows:5 windows x86 arch:x86
d13086c9d5cf61fc6c43b98629e48e57
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
PathIsRelativeA
PathIsNetworkPathA
SHDeleteKeyA
kernel32
ReadFile
CopyFileA
SetFilePointer
EndUpdateResourceA
UpdateResourceA
BeginUpdateResourceA
CreateDirectoryA
GetSystemDirectoryA
GetWindowsDirectoryA
OpenProcess
GetCurrentProcess
GetDiskFreeSpaceA
ResumeThread
SetPriorityClass
GetCurrentThread
SetThreadPriority
lstrlenA
GetTempPathA
MultiByteToWideChar
GetVersionExA
GetModuleFileNameA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
RaiseException
GetConsoleMode
GetConsoleCP
GetLocaleInfoA
CreateFileA
GetStringTypeA
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
InitializeCriticalSectionAndSpinCount
LoadLibraryA
GetStdHandle
HeapReAlloc
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
VirtualFree
HeapCreate
HeapSize
LCMapStringW
WideCharToMultiByte
LCMapStringA
GetCurrentThreadId
SetLastError
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
IsValidCodePage
GetOEMCP
GetFileSize
CreateFileMappingA
MapViewOfFile
WriteFile
UnmapViewOfFile
TerminateProcess
CreateProcessA
GetExitCodeProcess
CloseHandle
GetModuleHandleA
GetProcAddress
RemoveDirectoryA
FindFirstFileA
DeleteFileA
Sleep
FindNextFileA
FindClose
GetFileAttributesA
FindResourceA
LoadResource
LockResource
SizeofResource
FlushFileBuffers
GetStringTypeW
GetACP
InterlockedDecrement
InterlockedIncrement
GetCPInfo
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetStartupInfoA
GetCommandLineA
ExitProcess
GetModuleHandleW
CreateThread
GetSystemTimeAsFileTime
RtlUnwind
GetLastError
HeapFree
HeapAlloc
ExitThread
user32
DialogBoxParamA
SystemParametersInfoA
EnumWindows
GetClassNameA
ExitWindowsEx
FindWindowExA
GetWindowThreadProcessId
PostMessageA
LoadIconA
SetClassLongA
SetWindowPos
CreateDialogParamA
EnableWindow
SetDlgItemTextA
ShowWindow
EndDialog
SendDlgItemMessageA
LoadStringA
SetForegroundWindow
MessageBoxA
EnumChildWindows
SetWindowTextA
PeekMessageA
DispatchMessageA
TranslateMessage
SendMessageA
GetDlgItemTextA
GetDC
ReleaseDC
MoveWindow
CreateIconFromResource
GetFocus
DrawFocusRect
InvalidateRect
SetFocus
GetDlgItem
GetClientRect
MapWindowPoints
CreateWindowExA
SetWindowLongA
GetWindowTextA
RegisterClassA
GetWindowLongA
BeginPaint
FillRect
DrawTextA
DrawIconEx
EndPaint
DefWindowProcA
LookupIconIdFromDirectoryEx
CreateIconFromResourceEx
DestroyWindow
gdi32
CreateFontA
CreateFontIndirectA
SetBkMode
SetTextColor
GetStockObject
SelectObject
DeleteObject
advapi32
GetUserNameA
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenProcessToken
ImpersonateLoggedOnUser
RevertToSelf
RegEnumValueA
OpenSCManagerA
OpenServiceA
CloseServiceHandle
ControlService
RegDeleteValueA
RegEnumKeyExA
RegOpenKeyExA
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
shell32
SHGetSpecialFolderLocation
SHChangeNotify
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetMalloc
ShellExecuteA
ord680
ole32
CoCreateInstance
CoInitialize
CoUninitialize
Sections
.text Size: 96KB - Virtual size: 96KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 152KB - Virtual size: 152KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ