Static task
static1
Behavioral task
behavioral1
Sample
152786631c777f86ef86ad47b289c52a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
152786631c777f86ef86ad47b289c52a.exe
Resource
win10v2004-20231215-en
General
-
Target
152786631c777f86ef86ad47b289c52a
-
Size
140KB
-
MD5
152786631c777f86ef86ad47b289c52a
-
SHA1
ff0ec25e12abd1f62bffc108c4b7b22e59d61d3f
-
SHA256
c266bf5461e17374a8c62dbb9c9475e441e060b58dd2971bc8135afe261b30e7
-
SHA512
d0b0f97a205f8e61c11a8646b1b662d90c72ce9244518f711d86c9dd29414447860199747b5ef97028dcd745e6e412a72d45305fc79d27868c462fd382287b01
-
SSDEEP
3072:/uGUIY4jWtIHCJXlS2XQBXjhZN0MDJkFX5lgg8b9DeYt/yHB6Wg6A:/+IY4jWPJU2gNjhb04yFXDggClUh6Wgl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 152786631c777f86ef86ad47b289c52a
Files
-
152786631c777f86ef86ad47b289c52a.exe windows:4 windows x86 arch:x86
526ed57ac20d74c74561faacecb8f7c3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualQueryEx
ReadProcessMemory
GetThreadContext
GetProcAddress
GetModuleHandleA
TerminateProcess
ResumeThread
SetThreadContext
WriteProcessMemory
VirtualAllocEx
VirtualProtectEx
VirtualAlloc
GetTickCount
Sleep
CreateThread
lstrcpyA
FindClose
FindNextFileA
lstrcmpA
FindFirstFileA
lstrcatA
GetSystemDirectoryA
GetTempPathW
WideCharToMultiByte
LocalAlloc
GetModuleFileNameA
GetCurrentProcessId
GetTempPathA
WaitForSingleObject
CreateRemoteThread
SetFileTime
GetFileTime
ExitProcess
GetSystemInfo
VirtualProtect
GetLocaleInfoA
LocalFree
GetCurrentProcess
CreateToolhelp32Snapshot
Process32First
lstrcmpiA
Process32Next
OpenProcess
CloseHandle
HeapFree
GetProcessHeap
HeapAlloc
GetFileSize
CreateFileA
GetLastError
DeviceIoControl
ReadFile
lstrlenA
SetFilePointer
WriteFile
lstrcpyW
GetStringTypeW
GetStringTypeA
GetStartupInfoA
GetCommandLineA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
HeapReAlloc
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
TlsAlloc
SetLastError
GetCurrentThreadId
TlsFree
TlsSetValue
TlsGetValue
InitializeCriticalSection
RtlUnwind
InterlockedExchange
VirtualQuery
LoadLibraryA
GetACP
GetOEMCP
GetCPInfo
HeapSize
QueryPerformanceCounter
GetSystemTimeAsFileTime
LCMapStringA
MultiByteToWideChar
LCMapStringW
user32
LoadIconA
wsprintfA
advapi32
BuildExplicitAccessWithNameA
ControlService
OpenSCManagerA
OpenServiceA
CreateServiceA
ChangeServiceConfigA
CloseServiceHandle
DuplicateTokenEx
ImpersonateLoggedOnUser
GetKernelObjectSecurity
GetSecurityDescriptorDacl
GetUserNameA
SetEntriesInAclA
MakeAbsoluteSD
SetSecurityDescriptorDacl
SetKernelObjectSecurity
LookupPrivilegeValueA
OpenProcessToken
AdjustTokenPrivileges
shell32
ShellExecuteA
shlwapi
SHSetValueA
Sections
.text Size: 28KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 96KB - Virtual size: 98KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ