Static task
static1
Behavioral task
behavioral1
Sample
021904e35d00ad4b3bdebee20f5a4fce.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
021904e35d00ad4b3bdebee20f5a4fce.exe
Resource
win10v2004-20231222-en
General
-
Target
021904e35d00ad4b3bdebee20f5a4fce
-
Size
112KB
-
MD5
021904e35d00ad4b3bdebee20f5a4fce
-
SHA1
5ca4f5aba8f1b1de40e3233eb8a4fe9827323b1e
-
SHA256
dd2491f61d46b27534a6348f76cc0527fcfc4b15b814bde3eb7928da080b0fc3
-
SHA512
3be5c3813572cf49429b10d04d93491ec9ed5799a2a86d957cf7a3a69632e67f4aaea4a574dfc35e4e40ea18270d37eb7cbffdda70f8587a98309358a4eb0e6d
-
SSDEEP
3072:V1cyCPFWSQ8066mnuA5JE43+t4Ut/OBuEphAJ57dq5Yt/:QIlWVDra4UUnUd7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 021904e35d00ad4b3bdebee20f5a4fce
Files
-
021904e35d00ad4b3bdebee20f5a4fce.exe windows:4 windows x86 arch:x86
5a9a35f413bdeffe2247e957d047f590
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
dinput
DirectInputCreateW
ole32
PropVariantClear
StgPropertyLengthAsVariant
IsEqualGUID
winmm
auxOutMessage
joyGetPos
mciGetDeviceIDFromElementIDW
midiOutCacheDrumPatches
midiOutGetVolume
mmioCreateChunk
waveOutRestart
waveOutPrepareHeader
waveInStart
waveInReset
timeKillEvent
timeBeginPeriod
shell32
ShellExecuteA
SHFileOperationW
SHGetSpecialFolderPathW
kernel32
lstrlenA
BeginUpdateResourceA
CloseHandle
CreateFileA
CreateSemaphoreA
DeleteCriticalSection
EnumTimeFormatsA
EraseTape
ExitProcess
GetCommandLineA
GetConsoleMode
GetConsoleOutputCP
GetCurrentProcessId
GetFileInformationByHandle
GetLogicalDriveStringsW
GetModuleHandleA
GetTempPathW
GetTimeZoneInformation
GetVersionExA
GetVolumePathNameW
GetWindowsDirectoryA
GlobalAlloc
HeapCreate
HeapFree
LocalShrink
MulDiv
OpenJobObjectW
ReadFile
SetConsoleScreenBufferSize
TlsGetValue
WaitForMultipleObjectsEx
_llseek
HeapAlloc
user32
CreateWindowExA
DefWindowProcA
DestroyWindow
DialogBoxParamA
DispatchMessageA
EmptyClipboard
EnumPropsA
GetForegroundWindow
GetKeyState
GetTopWindow
LoadIconA
MessageBoxW
CharToOemA
OpenClipboard
PeekMessageA
RegisterClassA
RegisterShellHookWindow
RemoveMenu
SetRect
SetSystemCursor
SetUserObjectSecurity
ShowWindow
TranslateMessage
UpdateWindow
CharLowerW
CharLowerBuffA
MsgWaitForMultipleObjects
ws2_32
WSAGetLastError
WSAStringToAddressA
WSAUnhookBlockingHook
socket
listen
connect
closesocket
gethostbyname
htons
advapi32
BuildExplicitAccessWithNameW
CancelOverlappedAccess
SystemFunction013
SetUserFileEncryptionKey
SetFileSecurityW
RegRestoreKeyW
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
LsaQueryTrustedDomainInfo
IsValidSecurityDescriptor
InitializeSecurityDescriptor
GetTrusteeNameW
GetSecurityDescriptorDacl
GetFileSecurityW
GetCurrentHwProfileA
GetAclInformation
GetAce
EqualSid
version
VerQueryValueA
GetFileVersionInfoSizeA
GetFileVersionInfoA
Sections
.text Size: 76KB - Virtual size: 75KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ