CreateInterface
Static task
static1
Behavioral task
behavioral1
Sample
5a1c6412c1d1f907a181605d5337a1b7.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
5a1c6412c1d1f907a181605d5337a1b7.exe
Resource
win10v2004-20231215-en
General
-
Target
5a1c6412c1d1f907a181605d5337a1b7
-
Size
1.9MB
-
MD5
5a1c6412c1d1f907a181605d5337a1b7
-
SHA1
352b7b5d60e2c062c81a7c2d6ef17b111f2607ff
-
SHA256
5c7d423038da24d48932e764d431c8fd4a43d81befe3c612cd739344c792f5ea
-
SHA512
661840ce723cea99cf7acddfd3070777f13d88d4398c6b811254e44b4cac6b86400ef9019af66b83468d543a3e518c6b569480033e7452eb5ea316aff760e53e
-
SSDEEP
12288:lEXTnt+9AdQwqJnyv5jUSRn0GEBgGxhxgs9zpmPJFUkDAP9Z/u6NnHKzcuZ9Vvex:t7l4iSRiwY62bC0KVP6FCkSjrSUPmUZA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5a1c6412c1d1f907a181605d5337a1b7
Files
-
5a1c6412c1d1f907a181605d5337a1b7.exe windows:4 windows x86 arch:x86
c97f5470f88b4ce0648d62828c1ddab4
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
SHDeleteKeyA
kernel32
WriteFile
IsBadReadPtr
HeapValidate
FileTimeToSystemTime
FileTimeToLocalFileTime
SetFileTime
CreateDirectoryA
DosDateTimeToFileTime
SystemTimeToFileTime
ReadFile
CloseHandle
GetCurrentProcess
LocalFree
lstrlenA
lstrlenW
GetLocaleInfoW
SetEndOfFile
SetEnvironmentVariableA
CompareStringW
CompareStringA
GetTimeZoneInformation
GetStringTypeW
GetStringTypeA
CreateProcessA
GetExitCodeProcess
GetFileAttributesA
IsBadCodePtr
SetUnhandledExceptionFilter
GetUserDefaultLCID
DuplicateHandle
GetLocaleInfoA
IsValidCodePage
IsValidLocale
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetOEMCP
GetACP
GetCPInfo
RaiseException
FlushFileBuffers
SetHandleCount
SetStdHandle
LCMapStringW
LCMapStringA
SetConsoleCtrlHandler
SetCurrentDirectoryA
GetFullPathNameA
HeapCreate
HeapDestroy
GetEnvironmentVariableA
VirtualAlloc
VirtualFree
HeapFree
HeapReAlloc
HeapAlloc
GetCurrentThread
TlsGetValue
SetLastError
TlsFree
TlsAlloc
TlsSetValue
GetCurrentThreadId
FatalAppExitA
CreateFileA
GetFileType
SetFilePointer
FreeLibrary
LoadLibraryA
GetProcAddress
GetLocalTime
GetCommandLineA
GetDiskFreeSpaceExA
GetLogicalDriveStringsA
GlobalSize
EnterCriticalSection
QueryPerformanceCounter
DeleteFileA
LeaveCriticalSection
QueryPerformanceFrequency
DeleteCriticalSection
InitializeCriticalSection
GlobalAlloc
GlobalFree
GetVersionExA
GlobalLock
GlobalUnlock
WideCharToMultiByte
InterlockedDecrement
MultiByteToWideChar
GetModuleHandleA
FindClose
FindNextFileA
FindFirstFileA
OutputDebugStringA
GetCurrentDirectoryA
CreateMutexA
GetLastError
WaitForSingleObject
GetDriveTypeA
GetModuleFileNameA
IsBadWritePtr
EnumSystemLocalesA
GetStdHandle
DebugBreak
Sleep
GetVersion
GetStartupInfoA
TerminateProcess
ExitProcess
InterlockedIncrement
MoveFileA
RtlUnwind
user32
GetParent
CreateWindowExA
CallNextHookEx
PostMessageA
CallWindowProcA
MessageBoxA
GetWindowRect
PtInRect
GetClipboardData
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
GetKeyState
DefWindowProcA
ClientToScreen
BeginPaint
EndPaint
ValidateRect
LoadCursorA
LoadIconA
RegisterWindowMessageA
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
SystemParametersInfoA
WindowFromPoint
GetFocus
SetCursor
SetCapture
ReleaseCapture
DestroyWindow
GetWindowLongA
SetWindowLongA
SetWindowTextW
SetWindowTextA
IsIconic
FlashWindow
SetFocus
SetWindowPos
SetForegroundWindow
SetActiveWindow
LoadImageA
CreateIconIndirect
SetTimer
DestroyIcon
GetCursorPos
SetCursorPos
GetDC
ReleaseDC
IntersectRect
InvalidateRect
GetSysColor
GetWindow
GetWindowThreadProcessId
SetWindowsHookExA
EnumChildWindows
RedrawWindow
UnhookWindowsHookEx
ShowWindow
GetClassNameA
UnregisterClassA
RegisterClassA
gdi32
AddFontResourceA
BitBlt
CreateRectRgn
SetBkMode
SetTextAlign
CreateDIBSection
StretchBlt
ExtTextOutW
CreatePen
SetTextColor
GetTextColor
GetBkColor
CreateSolidBrush
Polygon
Polyline
ExtTextOutA
MoveToEx
SetBkColor
GetDeviceCaps
SetViewportOrgEx
SetRectRgn
RemoveFontResourceA
SetMapMode
LPtoDP
DPtoLP
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
GetDIBits
DeleteObject
DeleteDC
CreateBitmap
GetCharABCWidthsA
GetCharABCWidthsW
GetTextMetricsA
CreateFontA
EnumFontFamiliesExA
GetGlyphOutlineA
GetTextExtentPoint32A
advapi32
RegOpenKeyExA
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
shell32
Shell_NotifyIconA
ShellExecuteA
SHGetSpecialFolderPathA
DragQueryFileA
ole32
CoInitialize
OleInitialize
RegisterDragDrop
RevokeDragDrop
CoUninitialize
ReleaseStgMedium
CoCreateInstance
oleaut32
GetErrorInfo
SetErrorInfo
VariantChangeType
SysAllocString
SysFreeString
CreateErrorInfo
VariantClear
VariantInit
winmm
PlaySoundA
Exports
Exports
Sections
.text Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 112KB - Virtual size: 108KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 32KB - Virtual size: 66KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
�{���9 Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE