Static task
static1
Behavioral task
behavioral1
Sample
174e953c355709238abb1112e2ab3ea4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
174e953c355709238abb1112e2ab3ea4.exe
Resource
win10v2004-20231215-en
General
-
Target
174e953c355709238abb1112e2ab3ea4
-
Size
162KB
-
MD5
174e953c355709238abb1112e2ab3ea4
-
SHA1
80d3b873d2d27f39e0e0134c845963ea4d9667fa
-
SHA256
762a39be4660fdc7bb8de4fcf478903b1f2c3277d120e13699a8886cae40c737
-
SHA512
63cd2151df9d64bb411e2a28969e5d3d31a8dd4d3f1fb4242a88ae1d09c37c6f42da8a6cc29b01d4931c3d2162f85c92eb4a81e0a4d537b71bd455898fd56f65
-
SSDEEP
3072:TNsRGdtBn7wLuzhi3Ytpx6ull8LlXo2vXXThikst8pyqjdlj:RVRwLuzhMY7scl6tooXXt3st8p95l
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 174e953c355709238abb1112e2ab3ea4
Files
-
174e953c355709238abb1112e2ab3ea4.exe windows:5 windows x86 arch:x86
ba5066df740dabf2226f291241509217
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleFileNameW
CreateFileW
lstrcatA
ExitThread
MultiByteToWideChar
GetTempPathW
GetProcAddress
CreateEventW
lstrcmpiW
lstrcatW
OpenEventW
CloseHandle
DeleteFileW
lstrcpyW
CreateThread
lstrcpyA
lstrlenW
HeapReAlloc
CreateProcessW
HeapAlloc
GetCurrentProcess
HeapFree
GetProcessHeap
ReadProcessMemory
CreateEventA
TerminateProcess
GetModuleHandleA
VirtualProtect
CopyFileW
GetCurrentProcessId
ResumeThread
ExitProcess
SetFileTime
OpenProcess
LoadLibraryW
GetVersionExW
lstrcmpW
Process32FirstW
Process32NextW
CreateToolhelp32Snapshot
GetFileTime
GetCurrentThreadId
GetVolumeInformationW
GetCommandLineW
LocalFree
InterlockedIncrement
InitializeCriticalSection
LeaveCriticalSection
lstrcmpiA
EnterCriticalSection
DeleteCriticalSection
GetVolumeNameForVolumeMountPointW
ExpandEnvironmentStringsW
Sleep
WideCharToMultiByte
GetSystemDirectoryW
WriteFile
GetModuleHandleW
SetEvent
WaitForSingleObject
GetSystemWindowsDirectoryW
lstrlenA
SetFilePointer
DuplicateHandle
GetTempFileNameW
user32
KillTimer
PostQuitMessage
GetMessageW
SetTimer
EndPaint
OpenInputDesktop
SwitchDesktop
LoadCursorW
GetUserObjectInformationW
OpenWindowStationW
DestroyWindow
GetWindowRect
SetWindowLongW
CallWindowProcW
DefWindowProcW
wsprintfA
wsprintfW
BeginPaint
TranslateMessage
RegisterClassExW
ShowWindow
FrameRect
CreateWindowExW
GetSystemMetrics
UpdateWindow
DispatchMessageW
SetProcessWindowStation
CreateDesktopW
GetThreadDesktop
SetThreadDesktop
CloseWindowStation
gdi32
GetStockObject
advapi32
RegCreateKeyExW
AllocateAndInitializeSid
FreeSid
CheckTokenMembership
RegFlushKey
RegCloseKey
RegSetValueExW
shell32
SHGetFolderPathW
SHGetSpecialFolderPathW
CommandLineToArgvW
ShellExecuteW
ole32
OleUninitialize
OleInitialize
CoCreateInstance
CoInitializeEx
CoGetObject
StringFromGUID2
CoUninitialize
oleaut32
SysAllocString
SysFreeString
shlwapi
StrStrW
PathFileExistsW
StrCmpNW
PathFindFileNameW
PathAppendW
urlmon
CoInternetGetSession
CoInternetSetFeatureEnabled
Sections
.text Size: 14KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.data1 Size: 138KB - Virtual size: 140KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE