Static task
static1
Behavioral task
behavioral1
Sample
217c5762ba14e53eb59fcb19520236a1.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
217c5762ba14e53eb59fcb19520236a1.exe
Resource
win10v2004-20231215-en
General
-
Target
217c5762ba14e53eb59fcb19520236a1
-
Size
108KB
-
MD5
217c5762ba14e53eb59fcb19520236a1
-
SHA1
e41d7437acf51bf55ba5342d565383c8f1861650
-
SHA256
caae24e7ca541b6721a82e82960a73df79f68e0aef08d9d90b5713f2b2a502d4
-
SHA512
981661d2a62a407b522aa67e43666fe2547084d65fcffd93403183fdb142298fabbd10da8863caf1eae6c6408ca3b1dd75fbddf0bcea0f8f9e04fe4f6226f1fb
-
SSDEEP
3072:RSqyMgCYw/V85YRijDzy+ZM/xXJ3g+hZo:RSqyMgCYwmwWvy+ZM5xX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 217c5762ba14e53eb59fcb19520236a1
Files
-
217c5762ba14e53eb59fcb19520236a1.exe windows:4 windows x86 arch:x86
99eada9c3b04b6602b63e1edac4356d7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
??2@YAPAXI@Z
strstr
__CxxFrameHandler
sprintf
srand
time
_access
free
malloc
rand
strncpy
atol
rename
__dllonexit
_onexit
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
??1type_info@@UAE@XZ
_stricmp
_strcmpi
_ltoa
_rmdir
_chmod
_strupr
_strlwr
??0exception@@QAE@ABQBD@Z
??1exception@@UAE@XZ
_CxxThrowException
??0exception@@QAE@ABV0@@Z
memchr
memcmp
memmove
??3@YAXPAX@Z
strrchr
strchr
sscanf
memcpy
strcspn
atoi
_chdrive
memset
strlen
strcpy
_strnicmp
strcat
_chdir
kernel32
lstrlenA
lstrcpyA
WideCharToMultiByte
lstrlenW
Sleep
lstrcpynA
IsDebuggerPresent
FreeLibrary
LoadLibraryA
ResetEvent
WaitForSingleObject
InterlockedDecrement
CreateEventA
CloseHandle
ReadFile
CreateFileA
DeleteFileA
lstrcatA
GetTempPathA
GetSystemDirectoryA
GetTickCount
GetModuleFileNameA
GetLastError
WriteFile
SetFilePointer
GetFileSize
CopyFileA
RemoveDirectoryA
lstrcmpiA
CreateProcessA
OpenProcess
GetCurrentProcessId
GetLocalTime
GetStartupInfoA
SizeofResource
LoadResource
LockResource
FreeResource
GetTempFileNameA
TerminateProcess
GetCurrentProcess
CreateDirectoryA
MultiByteToWideChar
FormatMessageA
GetModuleHandleA
FindResourceA
RaiseException
GetProcAddress
LocalFree
GetVersionExA
LocalAlloc
InterlockedExchange
SetEvent
user32
RegisterClassExA
LoadCursorA
DefWindowProcA
SetTimer
KillTimer
GetMessageA
LoadStringA
MoveWindow
ShowWindow
CreateWindowExA
DestroyWindow
GetSystemMetrics
LoadIconA
PostMessageA
MessageBoxA
GetActiveWindow
IsWindow
FindWindowExA
SendMessageA
SetWindowPos
PeekMessageA
PostQuitMessage
TranslateMessage
DispatchMessageA
CharLowerA
FindWindowA
GetClientRect
GetDesktopWindow
FlashWindow
GetWindowThreadProcessId
ReleaseDC
GetDC
GetDlgItem
BeginPaint
DrawTextA
EndPaint
IsWindowVisible
GetDlgItemTextA
SetDlgItemTextA
DialogBoxParamA
EndDialog
CharUpperA
SetForegroundWindow
gdi32
GetDeviceCaps
SelectObject
CreateSolidBrush
SetTextColor
SetBkColor
CreateFontA
Rectangle
advapi32
AdjustTokenPrivileges
RegDeleteKeyA
RegCreateKeyExA
CryptDecrypt
CryptAcquireContextA
CryptDestroyKey
CryptDestroyHash
CryptCreateHash
CryptHashData
CryptDeriveKey
CryptEncrypt
CryptReleaseContext
OpenProcessToken
LookupPrivilegeValueA
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
RegSetValueExA
RegQueryValueExA
RegCloseKey
RegConnectRegistryA
RegOpenKeyExA
shell32
ShellExecuteA
Shell_NotifyIconA
urlmon
URLDownloadToCacheFileA
URLDownloadToFileA
wininet
InternetOpenA
InternetReadFile
InternetCrackUrlA
InternetCloseHandle
InternetGetConnectedState
InternetOpenUrlA
ole32
OleRun
CoUninitialize
CoInitialize
CLSIDFromString
CoCreateInstance
CoInitializeEx
oleaut32
SysAllocString
GetErrorInfo
VariantInit
SysStringLen
SysFreeString
VariantCopy
VariantClear
VariantChangeType
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
Sections
.text Size: 92KB - Virtual size: 92KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE