Static task
static1
Behavioral task
behavioral1
Sample
61b92b7ac0b90358a4962405adba8311.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
61b92b7ac0b90358a4962405adba8311.exe
Resource
win10v2004-20231222-en
General
-
Target
61b92b7ac0b90358a4962405adba8311
-
Size
48KB
-
MD5
61b92b7ac0b90358a4962405adba8311
-
SHA1
97ebeb0c6f9378e766459fc023a18e2db6a66246
-
SHA256
23f11b84998e3b827a0cf99ddac49a306d70445af9f85aaf4e5505377fc4406e
-
SHA512
06662b33e79ea4e6982b63d2726610f4ec0f88325e95b3f8c2ab2ae8ac89e79d2938eccb22ed9fb1e4064e49ca766adc80fa6c5ea06aa4c1f86ac52d06faad03
-
SSDEEP
768:AFHLicJ8rONo3/cGJ7ICH5aYj9HyitUzuUMaU7GELCgf4yuUroJ:ABLicJYJ7IGhpy+QbpU7GELCgfQUY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 61b92b7ac0b90358a4962405adba8311
Files
-
61b92b7ac0b90358a4962405adba8311.exe windows:5 windows x86 arch:x86
46f571ce30e1dee953383f7482747276
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FormatMessageW
EnumSystemLanguageGroupsA
SetConsoleKeyShortcuts
GlobalSize
SwitchToFiber
IsValidLocale
GetConsoleCursorMode
VirtualFreeEx
GetConsoleInputExeNameW
GetTimeFormatA
GetProfileSectionA
BaseFlushAppcompatCache
BuildCommDCBW
DefineDosDeviceW
DefineDosDeviceA
LoadLibraryA
SetFirmwareEnvironmentVariableA
SetLastError
CreateEventW
FatalAppExitA
WaitForMultipleObjects
ConvertDefaultLocale
VirtualAlloc
ExitProcess
PeekNamedPipe
IsSystemResumeAutomatic
BackupSeek
IsDebuggerPresent
OutputDebugStringA
EnumDateFormatsExA
VirtualUnlock
EnumSystemLocalesA
SetConsoleDisplayMode
GetVolumePathNameA
CopyFileExA
LZDone
FindNextVolumeA
GetPrivateProfileSectionNamesA
GetVersionExW
GetTimeFormatW
SetEvent
GetSystemTimeAsFileTime
InitializeCriticalSection
GetEnvironmentStringsW
crypt32
CryptAcquireContextU
CryptMsgUpdate
CryptEnumProvidersU
CryptSIPLoad
CryptSIPPutSignedDataMsg
CryptMsgCountersignEncoded
CertSerializeCTLStoreElement
CertGetCertificateChain
CertSetEnhancedKeyUsage
CertDeleteCTLFromStore
CertRemoveStoreFromCollection
CryptSIPRetrieveSubjectGuid
I_CryptReadTrustedPublisherDWORDValueFromRegistry
CertEnumCRLsInStore
CryptMemRealloc
sqlunirl
_SetMenuItemInfo_@16
_WritePrivateProfileString_@16
_CreateScalableFontResource_@16
_GetMenuItemInfo_@16
_BeginUpdateResource_@8
_Shell_NotifyIcon_@8
_CreateProcessAsUser_@44
_GetMenuString_@20
_GetCommandLine_@0
_SendNotifyMessage_@16
_EnumResourceLanguages_@20
_CreatePropertySheetPage_@4
_GetCharWidth32_@16
_FindResourceEx_@16
_UnregisterClass_@8
_FreeEnvironmentStrings@4
AbortSystemShutdown_
user32
RegisterClassA
PostQuitMessage
DefWindowProcA
msvcrt
_getdrives
_onexit
__initenv
__p__acmdln
??1bad_cast@@UAE@XZ
toupper
_atodbl
fclose
_mbsnicoll
_wcsset
__threadhandle
___setlc_active_func
??_Gbad_typeid@@UAEPAXI@Z
_memicmp
_mbsnbcat
_putws
??8type_info@@QBEHABV0@@Z
strtok
__mb_cur_max
__p__winmajor
Sections
.text Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 686B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ