Static task
static1
Behavioral task
behavioral1
Sample
539f8693f1c328243a417a8acf6ccf4c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
539f8693f1c328243a417a8acf6ccf4c.exe
Resource
win10v2004-20231215-en
General
-
Target
539f8693f1c328243a417a8acf6ccf4c
-
Size
1.3MB
-
MD5
539f8693f1c328243a417a8acf6ccf4c
-
SHA1
b591aaf5123752e87ec820b0438fc81d47cecdf6
-
SHA256
1632701fcd18e326e7b8718d3b54d79c58a0e84e32178009d421382f87a3ff9f
-
SHA512
638141ae49b628fda9cea4b7316834210b1ff520cb6e65e4a89decb3033d34d33eee376b183cacacad111393fac78c4118c52687504332782f69d90874f84eaf
-
SSDEEP
24576:lS+VZMijuqkncxnfS//2oYP+ENxuIW/Rjl/lVlP64htKQtsVELVDiicYQRebMyHG:lHVZMijuqgcxfSE+HIuRjl/lVlP64htM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 539f8693f1c328243a417a8acf6ccf4c
Files
-
539f8693f1c328243a417a8acf6ccf4c.exe windows:5 windows x86 arch:x86
37511458da9deb9ca2829c454be5a137
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
wininet
InternetOpenUrlW
InternetCloseHandle
InternetSetStatusCallbackW
HttpQueryInfoW
InternetOpenW
InternetReadFileExA
kernel32
WaitForSingleObject
GetExitCodeProcess
CloseHandle
GetProcAddress
GetModuleHandleW
GetCurrentProcess
LoadLibraryW
WideCharToMultiByte
GetFileAttributesW
GetTempPathW
CreateFileW
GetFileSize
ReadFile
WriteFile
SetFilePointer
FindResourceW
LoadResource
LockResource
SizeofResource
GetTempFileNameW
Sleep
InitializeCriticalSection
DeleteCriticalSection
GetModuleFileNameW
DeleteFileW
FormatMessageW
LocalFree
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
CreateFileA
LCMapStringW
LCMapStringA
GetLastError
LoadLibraryA
GetStringTypeW
GetStringTypeA
GetLocaleInfoA
HeapReAlloc
VirtualAlloc
FlushFileBuffers
GetConsoleMode
GetConsoleCP
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
VirtualFree
HeapCreate
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
GetVersionExW
GetModuleFileNameA
LeaveCriticalSection
EnterCriticalSection
MultiByteToWideChar
CreateProcessA
GetModuleHandleA
InitializeCriticalSectionAndSpinCount
ExitProcess
HeapSize
GetCurrentThreadId
SetLastError
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
HeapAlloc
HeapFree
RtlUnwind
RaiseException
GetStartupInfoW
IsDebuggerPresent
InterlockedIncrement
InterlockedDecrement
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
user32
IsWindowVisible
IsWindowEnabled
SendMessageW
IsDialogMessageW
GetWindowLongW
SendDlgItemMessageW
CheckDlgButton
GetCursor
IsDlgButtonChecked
EnableWindow
SetFocus
SetDlgItemTextW
KillTimer
SetTimer
LoadBitmapW
GetDlgItem
FillRect
GetAncestor
ShowWindow
MessageBoxW
DispatchMessageW
TranslateMessage
GetWindowTextW
PostMessageW
GetMessageW
SetWindowPos
DestroyWindow
LoadIconW
CreateDialogParamW
GetDlgItemTextW
DrawTextW
GetClientRect
GetDC
SetPropW
GetParent
SetCursor
LoadCursorW
RemovePropW
SetWindowLongW
CallWindowProcW
GetPropW
SetWindowTextW
EnumChildWindows
gdi32
CreatePatternBrush
SelectObject
GetStockObject
SetBkMode
SetTextColor
CreateFontIndirectW
GetObjectW
advapi32
RegCloseKey
RegSetValueExW
RegCreateKeyExW
RegQueryValueExW
RegOpenKeyExW
shell32
SHBrowseForFolderW
ShellExecuteW
ord190
SHOpenFolderAndSelectItems
ord155
SHGetPathFromIDListW
ShellExecuteExW
SHCreateDirectoryExW
SHGetSpecialFolderPathW
ole32
CoUninitialize
CoCreateInstance
CoTaskMemFree
CoInitializeEx
Sections
.text Size: 107KB - Virtual size: 107KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 27KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ