Static task
static1
Behavioral task
behavioral1
Sample
32a6cc41196a068bb185f593f4f3a90d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
32a6cc41196a068bb185f593f4f3a90d.exe
Resource
win10v2004-20231215-en
General
-
Target
32a6cc41196a068bb185f593f4f3a90d
-
Size
260KB
-
MD5
32a6cc41196a068bb185f593f4f3a90d
-
SHA1
7fc9a35ca2aada4a0e2032c1d8f33b43f9a5cb80
-
SHA256
794515abbc0bdb7277ec33625b0ba330026a81bcfcdf3a00622ba95f0fbe6e81
-
SHA512
80432078c73b924c2b8dd7967a5795e3902d376aa70ab10dc42233b9dfc20d711c29d82df2f8f9c09cc570ea63a1ee3ff44c09df8e3c6c7caad67d012ef0c02c
-
SSDEEP
6144:tJGfOvTmUwYOLYAldVwxSd+LCWmNibWgW3I:t4foUYfAldVwx5LFmIhW4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 32a6cc41196a068bb185f593f4f3a90d
Files
-
32a6cc41196a068bb185f593f4f3a90d.exe windows:4 windows x86 arch:x86
44ff48658e712eb7e94653b8438446d7
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetSystemDirectoryW
GetFileAttributesW
GetModuleFileNameW
GetTempPathW
GetLastError
LocalAlloc
GetCurrentThread
OpenEventW
GetWindowsDirectoryW
LocalFree
lstrcpynW
WaitForSingleObject
SetEvent
InitializeCriticalSection
Sleep
CreateEventW
FreeLibrary
SetErrorMode
LoadLibraryW
CreateDirectoryW
GetCurrentProcess
lstrlenW
MultiByteToWideChar
lstrlenA
GetExitCodeProcess
MoveFileW
CreateMutexW
ExpandEnvironmentStringsW
ExpandEnvironmentStringsA
LoadLibraryA
RemoveDirectoryW
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
Beep
GetVersionExW
GetModuleHandleW
BeginUpdateResourceW
GetProcAddress
user32
GetForegroundWindow
MoveWindow
IsWindow
GetTopWindow
MessageBeep
PostMessageW
OffsetRect
RegisterWindowMessageW
InvalidateRect
DestroyIcon
SetWindowPos
SendMessageW
EnableWindow
gdi32
CreateFontIndirectW
CreateFontW
DeleteObject
CreatePatternBrush
CreateSolidBrush
advapi32
FreeSid
RegOpenKeyExA
RegQueryValueExA
RegEnumKeyExW
OpenServiceW
QueryServiceStatus
OpenSCManagerW
CloseServiceHandle
RegCreateKeyExW
RegSetValueExW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
GetUserNameW
GetLengthSid
IsValidSecurityDescriptor
RevertToSelf
AddAccessAllowedAce
SetSecurityDescriptorOwner
AllocateAndInitializeSid
OpenProcessToken
OpenThreadToken
SetSecurityDescriptorGroup
AccessCheck
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
ImpersonateSelf
InitializeAcl
shell32
SHGetSpecialFolderLocation
ShellExecuteW
SHBrowseForFolderW
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
ole32
CoCreateInstance
mapistub
MAPIInitialize
DllGetClassObject
OpenStreamOnFile
cmc_read
BMAPISendMail
cmc_logoff
BMAPIFindNext
MAPIOpenLocalFormContainer
kbdcz1
KbdLayerDescriptor
Sections
.edata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.text Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.edata Size: 4KB - Virtual size: 466KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 3KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 99KB - Virtual size: 158KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 1KB - Virtual size: 98KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 6KB - Virtual size: 317KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 120KB - Virtual size: 126KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ