PIEImportTest
Static task
static1
Behavioral task
behavioral1
Sample
17e161c9c509ab55baf9e38502389d65.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
17e161c9c509ab55baf9e38502389d65.exe
Resource
win10v2004-20231215-en
General
-
Target
17e161c9c509ab55baf9e38502389d65
-
Size
3.2MB
-
MD5
17e161c9c509ab55baf9e38502389d65
-
SHA1
872c56c1ee0af19692dd4d60460297d29128719f
-
SHA256
d47ee8947d9b9ba8c9a4bac11b738cc462df1c3e27c4169b5a43c81cf23983b7
-
SHA512
84068082e2855d6e82cf2d0a9d1e5bc6a07b5081a442a508b08b27d301d010cb49906f0fbc7b59ef5f6b85a0b93be4bf7554283e3784bab224b2eca9ff839ce3
-
SSDEEP
49152:eCumB3g+EgJd0k7FTVXbHYcvz27PfMhFI75vXrSvSUROvKE:eCuog+EgP0k7RQPiFA5vXrSvStvKE
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 17e161c9c509ab55baf9e38502389d65
Files
-
17e161c9c509ab55baf9e38502389d65.exe windows:4 windows x86 arch:x86
1341328190da65fd22fdc3566fcdc9cf
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLocaleInfoA
EnumResourceLanguagesA
ConvertDefaultLocale
GetCurrentThreadId
GlobalDeleteAtom
SuspendThread
GlobalAddAtomA
GetCurrentProcessId
GetModuleFileNameW
InterlockedDecrement
lstrcmpW
GlobalFindAtomA
GlobalGetAtomNameA
GetThreadLocale
SetFilePointer
LockFile
UnlockFile
SetEndOfFile
GetFileSize
DuplicateHandle
GetVolumeInformationA
GetFullPathNameA
CreateFileA
RaiseException
GlobalFlags
GlobalReAlloc
GlobalHandle
LocalReAlloc
InterlockedIncrement
GetCPInfo
GetOEMCP
SetErrorMode
GetTickCount
HeapReAlloc
VirtualProtect
lstrcmpA
GetCommandLineA
GetStartupInfoA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetTimeFormatA
GetDateFormatA
GetSystemTimeAsFileTime
ExitThread
CreateThread
SetEnvironmentVariableA
SetStdHandle
GetFileType
ExitProcess
RtlUnwind
HeapSize
HeapDestroy
HeapCreate
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
QueryPerformanceCounter
GetACP
IsValidCodePage
GetTimeZoneInformation
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetConsoleCP
GetConsoleMode
GetDriveTypeA
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetLocaleInfoW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileW
QueryDosDeviceA
WriteFile
ReadFile
ConnectNamedPipe
VirtualFree
VirtualAlloc
DisconnectNamedPipe
FlushFileBuffers
TlsFree
TlsGetValue
TlsSetValue
TlsAlloc
GetTempPathA
GetCurrentThread
WritePrivateProfileStringA
HeapFree
GetProcessHeap
HeapAlloc
DeleteCriticalSection
CreateDirectoryA
InitializeCriticalSection
GetStdHandle
LeaveCriticalSection
EnterCriticalSection
GetSystemTime
CreateProcessA
SearchPathA
LocalAlloc
MoveFileA
CopyFileA
TerminateProcess
SetFileAttributesA
GetFileAttributesA
CreateNamedPipeA
GetSystemInfo
FormatMessageA
GetFileTime
ExpandEnvironmentStringsA
LocalFree
GetVersionExA
lstrcatA
lstrcpyA
GlobalUnlock
GlobalLock
ResetEvent
SetEvent
FreeResource
GlobalAlloc
ResumeThread
GlobalFree
MulDiv
GetWindowsDirectoryA
GetModuleFileNameA
FileTimeToLocalFileTime
FileTimeToSystemTime
lstrcpynA
GetLocalTime
SetThreadPriority
GetModuleHandleA
CreateEventA
FreeLibrary
WaitForSingleObject
SetLastError
WinExec
FindFirstFileA
SetCurrentDirectoryA
LockResource
SizeofResource
LoadResource
FindResourceA
GetCurrentDirectoryA
DeleteFileA
FindClose
FindNextFileA
Sleep
GetCurrentProcess
CloseHandle
LoadLibraryA
GetProcAddress
CompareStringA
GetLastError
MultiByteToWideChar
CompareStringW
GetEnvironmentVariableA
InterlockedExchange
WideCharToMultiByte
lstrlenA
GetVersion
VirtualQuery
user32
DestroyMenu
CopyAcceleratorTableA
IsRectEmpty
InvalidateRgn
CharNextA
MapDialogRect
SetWindowContextHelpId
RegisterClipboardFormatA
GetNextDlgGroupItem
PostThreadMessageA
CreateDialogIndirectParamA
GetNextDlgTabItem
EndDialog
RegisterWindowMessageA
WinHelpA
IsChild
GetClassLongA
GetClassNameA
RemovePropA
GetForegroundWindow
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
UpdateWindow
GetMenu
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
EqualRect
GetScrollInfo
CallWindowProcA
OffsetRect
GetWindowPlacement
GetMenuItemID
GetMenuItemCount
SetFocus
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
SetDlgItemTextA
SendDlgItemMessageA
GetDlgItem
GetWindow
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
ScreenToClient
GrayStringA
DrawTextExA
TabbedTextOutA
UnhookWindowsHookEx
GetWindowThreadProcessId
GetLastActivePopup
SetWindowsHookExA
CallNextHookEx
GetMessageA
IsWindowVisible
GetKeyState
ValidateRect
PostQuitMessage
TrackMouseEvent
HideCaret
SetActiveWindow
GetActiveWindow
IsWindowEnabled
GetDesktopWindow
GetFocus
IsWindow
SetCapture
PtInRect
MessageBeep
CopyIcon
InflateRect
GetCaretPos
DestroyIcon
SendMessageCallbackA
CreateWindowExA
EndPaint
BeginPaint
SetPropA
GetDlgCtrlID
DefWindowProcA
GetPropA
LoadBitmapA
SetWindowLongA
UnregisterClassA
RegisterClassExA
GetParent
FillRect
GetWindowTextA
GetWindowTextLengthA
DrawFocusRect
SetClassLongA
DrawEdge
ReleaseCapture
ClientToScreen
CharUpperA
PeekMessageA
RedrawWindow
TranslateMessage
EnableWindow
GetWindowLongA
DispatchMessageA
SendMessageA
SetTimer
KillTimer
ExitWindowsEx
FindWindowA
MessageBoxA
PostMessageA
InvalidateRect
GetWindowRect
IsIconic
GetSystemMetrics
GetClientRect
DrawIcon
LoadIconA
LoadMenuA
SetForegroundWindow
GetSubMenu
GetCursorPos
TrackPopupMenu
GetSysColor
DrawTextA
SetWindowRgn
SetCursor
SystemParametersInfoA
SetWindowPos
GetWindowDC
ReleaseDC
LoadCursorA
SetRect
GetSysColorBrush
WindowFromPoint
GetCapture
DestroyCursor
GetDC
CopyRect
IntersectRect
gdi32
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetCurrentPositionEx
ArcTo
ExtSelectClipRgn
CreatePen
SetViewportOrgEx
CreateRectRgnIndirect
GetMapMode
GetRgnBox
PtVisible
TextOutA
Escape
GetStockObject
GetWindowExtEx
GetViewportExtEx
MoveToEx
LineTo
GetClipBox
SetMapMode
RestoreDC
SaveDC
CreateBitmap
CreatePatternBrush
GetBkColor
GetCurrentObject
GetTextColor
GetTextExtentPoint32A
SetTextColor
SetBkColor
SetBkMode
ExtTextOutA
GetTextMetricsA
SelectObject
ExtCreateRegion
GetPixel
SelectClipRgn
DeleteDC
StretchBlt
CreateCompatibleBitmap
CreateFontIndirectA
BitBlt
CreateCompatibleDC
DeleteObject
CombineRgn
CreateRectRgn
CreateSolidBrush
GetDeviceCaps
GetObjectA
RectVisible
msimg32
GradientFill
comdlg32
GetFileTitleA
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
comctl32
_TrackMouseEvent
shlwapi
PathFileExistsA
PathIsDirectoryA
UrlUnescapeA
PathIsUNCA
PathStripToRootA
PathFindFileNameA
PathFindExtensionA
SHDeleteKeyA
oledlg
ord8
ole32
CoInitializeEx
CreateStreamOnHGlobal
CoCreateInstance
CoTaskMemFree
CoTaskMemAlloc
CoUninitialize
CLSIDFromString
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
CLSIDFromProgID
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CoRevokeClassObject
OleIsCurrentClipboard
OleFlushClipboard
CoRegisterMessageFilter
oleaut32
SafeArrayGetElemsize
OleCreateFontIndirect
OleLoadPicture
SysFreeString
SysStringLen
VarBstrCmp
SysAllocStringLen
SysAllocString
VariantClear
VariantChangeType
VariantInit
SysAllocStringByteLen
VariantCopy
DispCallFunc
LoadRegTypeLi
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayCreate
SafeArrayDestroy
VariantTimeToSystemTime
SystemTimeToVariantTime
wininet
HttpOpenRequestA
InternetOpenUrlA
InternetConnectA
HttpSendRequestA
InternetReadFile
InternetWriteFile
InternetSetFilePointer
InternetSetStatusCallback
InternetOpenA
InternetGetLastResponseInfoA
InternetCloseHandle
HttpQueryInfoA
InternetQueryDataAvailable
InternetCrackUrlA
InternetCanonicalizeUrlA
InternetQueryOptionA
InternetSetOptionExA
version
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
Exports
Exports
Sections
.text Size: 836KB - Virtual size: 835KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 176KB - Virtual size: 174KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2.2MB - Virtual size: 2.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ