Static task
static1
Behavioral task
behavioral1
Sample
1f2124b0f29fcb05cfc4205197381719.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1f2124b0f29fcb05cfc4205197381719.exe
Resource
win10v2004-20231215-en
General
-
Target
1f2124b0f29fcb05cfc4205197381719
-
Size
303KB
-
MD5
1f2124b0f29fcb05cfc4205197381719
-
SHA1
9988c776190357164e8aa1b8268301e3a12b4c3a
-
SHA256
e5c3bb5fe515b17dd0668631a4242787f0a0bc87378071768230c0bf145dc08a
-
SHA512
027a6df9c0f812fb415f27fc45e8ce0079f4d9f0711931325ace6ff8a694c14efeb09acaad956d31dc41dcf26add9d70b703547ee5b29108f8db0f461852b0ca
-
SSDEEP
6144:0PDRrOpaOzOziasZ6wM1W2vJsMItbsdVeFkC:aDkZdFvM1RurxsdE+C
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1f2124b0f29fcb05cfc4205197381719
Files
-
1f2124b0f29fcb05cfc4205197381719.exe windows:4 windows x86 arch:x86
03557481bc3b99c7677b9a5bc55cb9e1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DosDateTimeToFileTime
GetPrivateProfileStringA
GetCurrentProcess
LocalFileTimeToFileTime
SetFileTime
MoveFileExA
SetFilePointer
WriteFile
MoveFileA
GetFileAttributesA
lstrcmpA
SetEndOfFile
lstrcpynA
GetLocalTime
SetCurrentDirectoryA
GetDriveTypeA
GetDiskFreeSpaceA
CreateDirectoryA
GetLastError
GetCurrentThread
GetCurrentDirectoryA
GlobalReAlloc
FileTimeToLocalFileTime
GetFileTime
FileTimeToDosDateTime
GetPrivateProfileSectionA
SetFileAttributesA
DeleteFileA
FindNextFileA
FindClose
WinExec
Sleep
GetModuleFileNameA
GetSystemDefaultLCID
MulDiv
GetWindowsDirectoryA
GetTickCount
lstrcatA
lstrcmpiA
lstrlenA
lstrcpyA
CreateFileA
GetFileSize
GlobalAlloc
CloseHandle
GlobalLock
ReadFile
GlobalUnlock
GetModuleHandleA
GetSystemInfo
FindResourceA
LoadResource
SizeofResource
FreeResource
LockResource
OpenFile
_hwrite
_lclose
GetVersion
IsDBCSLeadByte
GetSystemDirectoryA
WriteProfileSectionA
WritePrivateProfileSectionA
WritePrivateProfileStringA
GlobalCompact
WriteProfileStringA
GetFileType
LCMapStringA
GetProfileSectionA
GlobalHandle
SetErrorMode
GlobalFree
LoadLibraryA
GetProcAddress
FreeLibrary
FindFirstFileA
RemoveDirectoryA
RtlUnwind
GetStdHandle
SetHandleCount
GetOEMCP
GetACP
GetCPInfo
WideCharToMultiByte
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
MultiByteToWideChar
FreeEnvironmentStringsA
UnhandledExceptionFilter
TerminateProcess
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetSystemTime
GetTimeZoneInformation
ExitProcess
GetCommandLineA
GetStartupInfoA
HeapFree
HeapAlloc
LCMapStringW
GetStringTypeA
GetStringTypeW
CompareStringA
CompareStringW
SetEnvironmentVariableA
HeapReAlloc
user32
SetDlgItemTextA
LoadStringA
MessageBoxA
EndDialog
DialogBoxParamA
wsprintfA
PeekMessageA
SendDlgItemMessageA
BeginPaint
EndPaint
DefWindowProcA
LoadCursorA
GetClassInfoA
OemToCharA
KillTimer
PostQuitMessage
RegisterClassA
GetSysColor
IsDialogMessageA
CharLowerA
CreateWindowExA
EnableWindow
GetWindow
GetClassNameA
CharUpperA
GetWindowTextA
GetDlgItem
SendMessageA
PostMessageA
SetWindowTextA
GetSystemMetrics
SetWindowPos
ShowWindow
UpdateWindow
SetFocus
IsWindow
RegisterWindowMessageA
GetDC
ReleaseDC
ScreenToClient
SetTimer
LoadIconA
DestroyWindow
LoadBitmapA
CreateDialogParamA
InvalidateRect
IsWindowVisible
CharNextA
InflateRect
CharPrevA
CharToOemA
DdeGetData
DdeFreeDataHandle
DdeConnect
DdeClientTransaction
DdeGetLastError
DdeDisconnect
DdeFreeStringHandle
DdeUninitialize
DdeInitializeA
DdeCreateStringHandleA
ExitWindowsEx
FindWindowA
GetClientRect
FillRect
SetRect
SetRectEmpty
GetWindowLongA
GetWindowRect
DispatchMessageA
TranslateMessage
MessageBeep
gdi32
CreateDIBitmap
SelectPalette
GetDeviceCaps
CreatePalette
GetSystemPaletteEntries
LineTo
MoveToEx
DeleteObject
CreatePen
CreateFontIndirectA
GetObjectA
DeleteDC
BitBlt
CreateCompatibleDC
RestoreDC
Rectangle
GetStockObject
CreateSolidBrush
IntersectClipRect
SaveDC
CreateCompatibleBitmap
SetBkColor
CreateBitmap
SetPixel
GetTextExtentPointA
SelectObject
RealizePalette
comdlg32
GetOpenFileNameA
GetSaveFileNameA
advapi32
AllocateAndInitializeSid
RegCloseKey
RegConnectRegistryA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
CloseServiceHandle
OpenSCManagerA
FreeSid
RegCreateKeyExA
SetSecurityDescriptorOwner
InitializeSecurityDescriptor
RegOpenKeyA
RegDeleteKeyA
RegEnumKeyA
RegSetValueExA
RegQueryValueExA
RegDeleteValueA
RegEnumValueA
EqualSid
GetTokenInformation
OpenThreadToken
shell32
SHGetSpecialFolderLocation
SHGetPathFromIDListA
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
Sections
.text Size: 125KB - Virtual size: 125KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 14KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 156KB - Virtual size: 176KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE