PIEImportTest
Static task
static1
Behavioral task
behavioral1
Sample
1b7f6ae6bd3828b8bc80009843c4f114.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1b7f6ae6bd3828b8bc80009843c4f114.exe
Resource
win10v2004-20231215-en
General
-
Target
1b7f6ae6bd3828b8bc80009843c4f114
-
Size
6.7MB
-
MD5
1b7f6ae6bd3828b8bc80009843c4f114
-
SHA1
92b10ba8b843c01a904a1e9fd4c1fc9ea6815299
-
SHA256
7bf97abdbea723cd8dfe2698e8c1488a8af6560ca3d9b31decd8970345fb2895
-
SHA512
30ae0032f9ec6bb07baa9ae4cc11bbfe9547f88a32b624fa6f250ceb6122fced69be2fd7cb6ac2c0e1dfac1cb7b197e0e845fb23f586031b4edf7591ec8debe3
-
SSDEEP
98304:Ddk9nG2FnRkHH6n6wuq7ZIrFzJngpcDHD5y2Xvhe:WRjMnU6w7Z0Xpe
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1b7f6ae6bd3828b8bc80009843c4f114
Files
-
1b7f6ae6bd3828b8bc80009843c4f114.exe windows:4 windows x86 arch:x86
97984c3aef66c0a7e2957ba02625ca94
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLocaleInfoA
EnumResourceLanguagesA
ConvertDefaultLocale
GetCurrentThreadId
GlobalDeleteAtom
SuspendThread
GlobalAddAtomA
GetCurrentProcessId
GetModuleFileNameW
InterlockedDecrement
lstrcmpW
GlobalFindAtomA
GlobalGetAtomNameA
GetThreadLocale
SetFilePointer
LockFile
UnlockFile
SetEndOfFile
GetFileSize
DuplicateHandle
GetVolumeInformationA
GetFullPathNameA
CreateFileA
RaiseException
GlobalFlags
GlobalReAlloc
GlobalHandle
LocalReAlloc
InterlockedIncrement
GetCPInfo
GetOEMCP
SetErrorMode
GetTickCount
HeapReAlloc
VirtualProtect
lstrcmpA
GetCommandLineA
GetStartupInfoA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetTimeFormatA
GetDateFormatA
GetSystemTimeAsFileTime
ExitThread
CreateThread
SetStdHandle
GetFileType
SetEnvironmentVariableA
ExitProcess
RtlUnwind
HeapSize
HeapDestroy
HeapCreate
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
QueryPerformanceCounter
GetACP
IsValidCodePage
LCMapStringA
LCMapStringW
GetTimeZoneInformation
GetStringTypeA
GetStringTypeW
GetConsoleCP
GetConsoleMode
GetDriveTypeA
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetLocaleInfoW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileW
QueryDosDeviceA
WriteFile
ReadFile
ConnectNamedPipe
VirtualFree
VirtualAlloc
DisconnectNamedPipe
FlushFileBuffers
TlsFree
TlsGetValue
TlsSetValue
TlsAlloc
GetTempPathA
GetCurrentThread
GetProcessHeap
HeapAlloc
WritePrivateProfileStringA
HeapFree
LocalAlloc
CreateProcessA
SearchPathA
GetSystemTime
CopyFileA
SetFileAttributesA
GetFileAttributesA
CreateNamedPipeA
LocalFree
TerminateProcess
GetSystemInfo
FormatMessageA
GetFileTime
ExpandEnvironmentStringsA
MoveFileA
LeaveCriticalSection
DeleteCriticalSection
EnterCriticalSection
CreateDirectoryA
InitializeCriticalSection
GetStdHandle
GetVersionExA
GlobalAlloc
ResumeThread
GlobalFree
GlobalUnlock
GlobalLock
ResetEvent
SetEvent
FreeResource
lstrcatA
lstrcpyA
MulDiv
GetWindowsDirectoryA
GetModuleFileNameA
lstrcpynA
GetLocalTime
FileTimeToLocalFileTime
FileTimeToSystemTime
SetThreadPriority
WinExec
FindFirstFileA
SetCurrentDirectoryA
GetCurrentDirectoryA
DeleteFileA
FindClose
FindNextFileA
GetCurrentProcess
LoadLibraryA
GetProcAddress
GetModuleHandleA
CreateEventA
FreeLibrary
CloseHandle
WaitForSingleObject
Sleep
SetLastError
LockResource
SizeofResource
LoadResource
FindResourceA
CompareStringA
MultiByteToWideChar
CompareStringW
GetEnvironmentVariableA
InterlockedExchange
WideCharToMultiByte
lstrlenA
GetVersion
VirtualQuery
GetLastError
user32
DestroyMenu
CopyAcceleratorTableA
IsRectEmpty
InvalidateRgn
CharNextA
MapDialogRect
SetWindowContextHelpId
RegisterClipboardFormatA
GetNextDlgGroupItem
PostThreadMessageA
CreateDialogIndirectParamA
GetNextDlgTabItem
EndDialog
RegisterWindowMessageA
WinHelpA
IsChild
GetClassLongA
GetClassNameA
RemovePropA
GetForegroundWindow
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
UpdateWindow
GetMenu
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
EqualRect
GetScrollInfo
CallWindowProcA
OffsetRect
GetWindowPlacement
GetMenuItemID
GetMenuItemCount
ScreenToClient
GrayStringA
DrawTextExA
TabbedTextOutA
UnhookWindowsHookEx
SetFocus
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
SetDlgItemTextA
SendDlgItemMessageA
GetDlgItem
GetWindow
GetWindowThreadProcessId
GetLastActivePopup
SetWindowsHookExA
CallNextHookEx
GetMessageA
IsWindowVisible
GetKeyState
ValidateRect
PostQuitMessage
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
TrackMouseEvent
HideCaret
SetActiveWindow
GetActiveWindow
IsWindowEnabled
GetDesktopWindow
GetFocus
GetCaretPos
DestroyIcon
CopyIcon
InflateRect
IsWindow
SetCapture
PtInRect
MessageBeep
SendMessageCallbackA
CreateWindowExA
EndPaint
BeginPaint
SetPropA
GetDlgCtrlID
DefWindowProcA
GetPropA
SendMessageA
LoadBitmapA
SetWindowLongA
UnregisterClassA
RegisterClassExA
GetParent
FillRect
GetWindowTextA
GetWindowTextLengthA
DrawFocusRect
SetClassLongA
DrawEdge
ReleaseCapture
ClientToScreen
CharUpperA
EnableWindow
GetSysColor
MessageBoxA
PostMessageA
FindWindowA
KillTimer
SetTimer
PeekMessageA
TranslateMessage
DispatchMessageA
GetWindowLongA
RedrawWindow
ExitWindowsEx
InvalidateRect
GetWindowRect
IsIconic
GetSystemMetrics
GetClientRect
DrawIcon
LoadIconA
LoadMenuA
SetForegroundWindow
GetSubMenu
GetCursorPos
TrackPopupMenu
DrawTextA
SetWindowRgn
SetCursor
SystemParametersInfoA
SetWindowPos
GetWindowDC
ReleaseDC
LoadCursorA
SetRect
GetSysColorBrush
WindowFromPoint
GetCapture
DestroyCursor
GetDC
CopyRect
IntersectRect
gdi32
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetCurrentPositionEx
ArcTo
ExtSelectClipRgn
CreatePen
SetViewportOrgEx
CreateRectRgnIndirect
GetMapMode
GetRgnBox
PtVisible
TextOutA
Escape
GetStockObject
GetWindowExtEx
GetViewportExtEx
MoveToEx
LineTo
GetClipBox
SetMapMode
RestoreDC
SaveDC
CreateBitmap
CreatePatternBrush
GetBkColor
GetCurrentObject
GetTextColor
GetTextExtentPoint32A
SetTextColor
SetBkColor
SetBkMode
ExtTextOutA
GetTextMetricsA
SelectObject
ExtCreateRegion
GetPixel
SelectClipRgn
DeleteDC
StretchBlt
CreateCompatibleBitmap
CreateFontIndirectA
BitBlt
CreateCompatibleDC
DeleteObject
CombineRgn
CreateRectRgn
GetDeviceCaps
CreateSolidBrush
GetObjectA
RectVisible
msimg32
GradientFill
comdlg32
GetFileTitleA
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
comctl32
_TrackMouseEvent
shlwapi
SHDeleteKeyA
PathIsDirectoryA
UrlUnescapeA
PathIsUNCA
PathStripToRootA
PathFindFileNameA
PathFindExtensionA
PathFileExistsA
oledlg
ord8
ole32
CoUninitialize
CreateStreamOnHGlobal
CoCreateInstance
CoTaskMemFree
CoTaskMemAlloc
CoInitializeEx
CLSIDFromString
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
CLSIDFromProgID
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CoRevokeClassObject
OleIsCurrentClipboard
OleFlushClipboard
CoRegisterMessageFilter
oleaut32
SafeArrayGetElemsize
OleCreateFontIndirect
OleLoadPicture
SysFreeString
SysStringLen
VarBstrCmp
SysAllocStringLen
SysAllocString
VariantClear
VariantChangeType
VariantInit
SysAllocStringByteLen
VariantCopy
DispCallFunc
LoadRegTypeLi
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayCreate
SafeArrayDestroy
VariantTimeToSystemTime
SystemTimeToVariantTime
wininet
HttpOpenRequestA
InternetOpenUrlA
InternetConnectA
HttpSendRequestA
InternetReadFile
InternetWriteFile
InternetSetFilePointer
InternetSetStatusCallback
InternetOpenA
InternetGetLastResponseInfoA
InternetCloseHandle
HttpQueryInfoA
InternetQueryDataAvailable
InternetCrackUrlA
InternetCanonicalizeUrlA
InternetQueryOptionA
InternetSetOptionExA
version
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
Exports
Exports
Sections
.text Size: 836KB - Virtual size: 834KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 176KB - Virtual size: 174KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5.7MB - Virtual size: 5.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ