Static task
static1
Behavioral task
behavioral1
Sample
35c14c36d0bffa0e5d99a785ac03e5b1.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
35c14c36d0bffa0e5d99a785ac03e5b1.exe
Resource
win10v2004-20231215-en
General
-
Target
35c14c36d0bffa0e5d99a785ac03e5b1
-
Size
268KB
-
MD5
35c14c36d0bffa0e5d99a785ac03e5b1
-
SHA1
232c8eb8b55c09ed724c6f0b07bad25ec7a29149
-
SHA256
34f7dc3b00f2797b117156ee5350ce455e8b0691ca60b17fa4c7b10f06f71b70
-
SHA512
bd1bfc2744b3ea4070aaf5d2b0cbd1b52cccd1046fc57e468db6a61b3a260b52d3e1963d79b7cb40b0423193872f897c0a92f7b04398d0116366ce3923c7d08b
-
SSDEEP
6144:BisQeFZ+/dyctYrT7/PsW8EZd40seWs9Zxip:YsTkbtYLPsfEHlWs9ap
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 35c14c36d0bffa0e5d99a785ac03e5b1
Files
-
35c14c36d0bffa0e5d99a785ac03e5b1.exe windows:4 windows x86 arch:x86
00b5cc35b148ad3ce778a33a2948baf6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentProcess
SetPriorityClass
ResumeThread
GetCurrentThread
GetWindowsDirectoryA
_lclose
_lwrite
GetSystemDirectoryA
CreateProcessA
_lopen
SetThreadPriority
SetCurrentDirectoryA
MoveFileExA
GetModuleFileNameA
GetShortPathNameA
GetVersionExA
lstrlenA
LoadLibraryA
GetProcAddress
FreeLibrary
CloseHandle
SetFilePointer
WriteFile
ReadFile
LocalAlloc
GetCurrentDirectoryA
WritePrivateProfileStringA
LocalFree
lstrcatA
_lread
_llseek
GetLastError
FindFirstFileA
TerminateProcess
DeleteFileA
GetStringTypeW
GetStringTypeA
GetTimeZoneInformation
RtlUnwind
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
CreateFileA
FreeEnvironmentStringsW
UnhandledExceptionFilter
LCMapStringW
LCMapStringA
MultiByteToWideChar
WideCharToMultiByte
GetOEMCP
GetACP
GetCPInfo
HeapReAlloc
SetEnvironmentVariableA
CompareStringW
CompareStringA
HeapCompact
HeapAlloc
HeapFree
RemoveDirectoryA
SetFileAttributesA
GetFileAttributesA
ExitProcess
FreeEnvironmentStringsA
GetStartupInfoA
GetModuleHandleA
FindNextFileA
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
VirtualFree
VirtualAlloc
GetCommandLineA
GetVersion
HeapDestroy
HeapCreate
user32
GetSysColor
GetWindow
SendMessageA
MessageBoxA
wsprintfA
SetDlgItemTextA
SetWindowTextA
GetMessageA
EndDialog
DialogBoxParamA
DefWindowProcA
PostQuitMessage
RegisterClassA
LoadCursorA
LoadIconA
CreateWindowExA
DestroyWindow
DispatchMessageA
gdi32
CreateSolidBrush
GetObjectA
SetBkColor
CreateFontIndirectA
RemoveFontResourceA
DeleteObject
GetStockObject
advapi32
RegCloseKey
RegDeleteValueA
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegDeleteKeyA
RegEnumKeyExA
RegOpenKeyA
shell32
SHGetSpecialFolderLocation
SHGetPathFromIDListA
ole32
OleUninitialize
OleInitialize
Sections
.text Size: 28KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tc Size: 196KB - Virtual size: 196KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE