Static task
static1
Behavioral task
behavioral1
Sample
12dcf3da7eb514d3798b7f0b09e38241.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
12dcf3da7eb514d3798b7f0b09e38241.exe
Resource
win10v2004-20231215-en
General
-
Target
12dcf3da7eb514d3798b7f0b09e38241
-
Size
80KB
-
MD5
12dcf3da7eb514d3798b7f0b09e38241
-
SHA1
9853cea658f6deff61c47d7676fa0da1ae00cf44
-
SHA256
d4783cbd9d405c2bca4281fb8fe988fc981ab57cc2e74f056b98dfc30db4493d
-
SHA512
b87369f9dd2070342a6a42c95afcd4816f86c4073598cd829aa84d1b2383543c14d7c3d356b8ef14afe650a731c17123c62aeafc4c09e1c20d767abacfa4287b
-
SSDEEP
1536:WcdoWo02oo4EFylA37qFy/voLgqksgaV06ruojs0t0N6U7:bo6E/YnTruoBeQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 12dcf3da7eb514d3798b7f0b09e38241
Files
-
12dcf3da7eb514d3798b7f0b09e38241.exe windows:4 windows x86 arch:x86
e57f136c9130f0754ca0d9eee9bd352e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentThread
GetCurrentProcessId
ExitProcess
VirtualAlloc
GetLastError
GetCurrentThreadId
GetCurrentProcess
GetOEMCP
GetCommandLineA
VirtualAllocEx
GetACP
LocalAlloc
GlobalAlloc
LoadLibraryExA
GetLastError
LocalReAlloc
VirtualAlloc
SizeofResource
CompareStringA
DeleteCriticalSection
CloseHandle
SetThreadLocale
GlobalAlloc
ExitThread
GetACP
SetLastError
GetStartupInfoA
LocalFree
GetSystemDefaultLangID
lstrcmpA
SetFilePointer
shlwapi
SHSetValueA
SHDeleteKeyA
PathFileExistsA
SHGetValueA
SHQueryInfoKeyA
SHDeleteValueA
SHSetValueA
SHEnumValueA
PathGetCharTypeA
PathIsDirectoryA
PathIsContentTypeA
PathFileExistsA
PathFileExistsA
SHEnumValueA
shell32
SHGetFileInfoA
SHGetFolderPathA
Shell_NotifyIconA
SHGetDiskFreeSpaceA
SHGetSpecialFolderLocation
SHGetDesktopFolder
SHGetSpecialFolderLocation
SHGetFolderPathA
SHGetFileInfoA
SHGetDesktopFolder
Shell_NotifyIconA
ole32
StgCreateDocfileOnILockBytes
StgOpenStorage
PropVariantClear
MkParseDisplayName
CLSIDFromProgID
CoGetMalloc
msvcrt
memmove
wcschr
clock
wcscspn
memcpy
wcsncmp
sprintf
malloc
calloc
atol
wcstol
exit
memset
sqrt
version
VerInstallFileA
VerInstallFileA
comdlg32
ChooseColorA
FindTextA
GetSaveFileNameA
user32
GetIconInfo
SetTimer
DrawIconEx
SystemParametersInfoA
EndPaint
DispatchMessageA
CallNextHookEx
GetDlgItem
CharLowerA
GetDC
EnableMenuItem
GetClientRect
GetClassLongA
MessageBoxA
IsWindowVisible
CreateMenu
SetTimer
GetForegroundWindow
GetIconInfo
GetMenuItemID
GetMenuItemInfoA
DrawTextA
GetFocus
CharToOemA
FrameRect
GetKeyNameTextA
DrawIcon
EqualRect
CreatePopupMenu
GetClassInfoA
gdi32
SelectObject
GetPixel
GetObjectA
CreateDIBSection
GetBitmapBits
GetPaletteEntries
CreateFontIndirectA
GetRgnBox
CreateFontIndirectA
CopyEnhMetaFileA
SetBkMode
CreateBitmap
GetRgnBox
BitBlt
SetTextColor
GetClipBox
RestoreDC
advapi32
RegEnumValueA
RegEnumKeyExA
RegQueryInfoKeyA
Sections
.tls Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.edata Size: 55KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 8KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
BSS Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 571B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ