Static task
static1
Behavioral task
behavioral1
Sample
14b2c51bf17e744032b867682896a883.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
14b2c51bf17e744032b867682896a883.exe
Resource
win10v2004-20231222-en
General
-
Target
14b2c51bf17e744032b867682896a883
-
Size
2.0MB
-
MD5
14b2c51bf17e744032b867682896a883
-
SHA1
560b0796cd57cdeebd9259a37de8aed40c9a0441
-
SHA256
e012ff069abc8cd1f1c08032f910aacf92be52d4abadba7a92da65371921cae3
-
SHA512
acd616a353a7fc66953cb0a1e75d811e2de6e170f587d67d9f8062dba66733e6377a9bbab45b31755a6e061e800726becf443987e2fc14ebf03723dd327241d7
-
SSDEEP
49152:0QSZPfcBEruT9xC4dh3V3lUlTs6NTgT0qRT6q/RwVX:mO7df3C/Unwq/C5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 14b2c51bf17e744032b867682896a883
Files
-
14b2c51bf17e744032b867682896a883.exe windows:4 windows x86 arch:x86
cf93c8634960e8e84bce8864c131359f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
SHGetSpecialFolderPathW
SHGetSpecialFolderLocation
CommandLineToArgvW
ShellExecuteW
SHGetPathFromIDListW
SHFileOperationW
SHBrowseForFolderW
SHCreateDirectoryExW
Shell_NotifyIconW
msi
ord159
ord118
ord8
ord92
ord195
ord160
ord32
ord70
ord88
ord137
ord141
ord169
advapi32
RegQueryValueExW
OpenServiceW
ChangeServiceConfigW
RegDeleteValueW
RegSetValueExW
RegCreateKeyW
CloseServiceHandle
RegCloseKey
OpenSCManagerW
QueryServiceStatus
RegOpenKeyExW
RegEnumKeyW
RegCreateKeyExW
RegQueryInfoKeyW
RegEnumKeyExW
RegDeleteKeyW
StartServiceW
shlwapi
PathAppendW
PathFileExistsW
PathStripToRootW
version
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
psapi
EnumProcessModules
GetModuleFileNameExW
ws2_32
htonl
htons
send
inet_addr
closesocket
connect
WSAStartup
socket
recv
WSACleanup
kernel32
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
FlushFileBuffers
GetStartupInfoA
GetFileType
SetHandleCount
GetStdHandle
HeapCreate
HeapDestroy
SetLastError
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
IsValidCodePage
GetOEMCP
GetConsoleMode
GetConsoleCP
LCMapStringW
LCMapStringA
GetCPInfo
FormatMessageW
LocalFree
GetLastError
GetSystemDirectoryW
GetVersionExW
SetFileAttributesW
LeaveCriticalSection
CreateProcessW
GetModuleFileNameW
EnterCriticalSection
CloseHandle
FindFirstFileW
CreateMutexW
GetCurrentDirectoryW
GetFileAttributesW
InitializeCriticalSection
DeleteCriticalSection
GetCurrentThreadId
VirtualFree
VirtualAlloc
FreeResource
GetDriveTypeW
FindResourceW
LoadResource
CreateDirectoryW
WriteFile
SizeofResource
ReadFile
CreateFileW
MultiByteToWideChar
GlobalLock
GlobalUnlock
GlobalAlloc
Sleep
CopyFileW
CreateThread
SuspendThread
WideCharToMultiByte
GetDiskFreeSpaceExW
FreeLibrary
FindNextFileW
GetPrivateProfileStringW
LoadLibraryW
MoveFileExW
GetProcAddress
RemoveDirectoryW
FindClose
GetPrivateProfileIntW
DeleteFileW
ResumeThread
WritePrivateProfileStringW
GetTickCount
GetWindowsDirectoryW
QueryPerformanceFrequency
QueryPerformanceCounter
MoveFileW
IsBadReadPtr
IsBadWritePtr
GetACP
lstrcmpW
Process32FirstW
CreateToolhelp32Snapshot
RemoveDirectoryA
Process32NextW
WaitForSingleObject
lstrcmpiW
TerminateProcess
DeleteFileA
OpenProcess
lstrcatA
LoadLibraryA
VirtualQuery
GetCurrentProcess
GetModuleFileNameA
GetModuleHandleA
GetCommandLineW
GetModuleHandleW
GetSystemTimeAsFileTime
GetProcessTimes
GetCurrentProcessId
SetFilePointer
GetProcessAffinityMask
SetProcessAffinityMask
RaiseException
InterlockedIncrement
InterlockedDecrement
ExitProcess
GetStringTypeW
GetStringTypeA
RtlUnwind
GetStartupInfoW
GetProcessHeap
GetVersionExA
HeapSize
HeapReAlloc
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
HeapAlloc
HeapFree
InterlockedExchange
InterlockedCompareExchange
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetLocaleInfoW
CreateFileA
SetEndOfFile
GetThreadLocale
LockResource
LocalAlloc
user32
DefWindowProcW
ExitWindowsEx
RegisterClassExW
GetClassInfoExW
GetDesktopWindow
ReleaseDC
LoadCursorW
IsWindowVisible
SetWindowLongW
BringWindowToTop
SetCursor
EnumWindows
SetDlgItemTextW
GetWindowThreadProcessId
PtInRect
CharNextW
InvalidateRect
GetWindowLongW
CreateDialogParamW
GetDlgCtrlID
OffsetRect
DestroyWindow
GetClassNameW
GetClientRect
GetKeyState
DrawIconEx
MapVirtualKeyW
GetWindow
SetWindowTextW
SetWindowRgn
SetWindowsHookExW
UnhookWindowsHookEx
BeginPaint
GetParent
TrackMouseEvent
ReleaseCapture
PostMessageW
DrawTextW
GetWindowTextW
SetTimer
ShowWindow
GetDlgItem
EnableWindow
TranslateMessage
LoadAcceleratorsW
DispatchMessageW
EndDialog
MessageBoxW
DialogBoxParamW
TranslateAcceleratorW
GetMessageW
SendMessageW
DestroyIcon
EndPaint
CallNextHookEx
GetDC
UpdateWindow
KillTimer
IsWindow
GetFocus
GetDlgItemTextW
CreateWindowExW
SetFocus
LoadBitmapW
GetActiveWindow
SetClassLongW
PostQuitMessage
ScreenToClient
GetWindowDC
SetWindowPos
LoadImageW
GetWindowRect
GetCursorPos
gdi32
CreateCompatibleDC
OffsetRgn
CreateRectRgn
CombineRgn
SetBkColor
BitBlt
CreateCompatibleBitmap
GetStockObject
DeleteObject
SelectObject
DeleteDC
GetTextExtentExPointW
GetTextExtentPointW
SetTextColor
CreateFontW
SetBkMode
ole32
CoUninitialize
CoCreateInstance
StringFromCLSID
CreateStreamOnHGlobal
CoInitializeEx
oleaut32
SysAllocString
SysStringLen
SysFreeString
Sections
.text Size: 368KB - Virtual size: 365KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 76KB - Virtual size: 73KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 436KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 36.3MB - Virtual size: 36.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ