Static task
static1
Behavioral task
behavioral1
Sample
696f6e0082b637a5495bb6911e2f5ffc.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
696f6e0082b637a5495bb6911e2f5ffc.exe
Resource
win10v2004-20231215-en
General
-
Target
696f6e0082b637a5495bb6911e2f5ffc
-
Size
161KB
-
MD5
696f6e0082b637a5495bb6911e2f5ffc
-
SHA1
adb586b72298dc8848388366032e7682ef3ff7f1
-
SHA256
c1bed73d152fe5b82b965da2d29ffbc8766ebc4fa16437cbe130e5da82de7905
-
SHA512
83a4bc5faee6d260d16d0a427c31369d06a0786e04dab9c64e6ef87e531bc54b42104eb3f3ece61ac7eee5a062fbdd7bcdbeead1242a04fe84ee0ac53a9afdfc
-
SSDEEP
3072:/Mj1MMA8r2+xro2KDc/ZiQL/biQ28ga9VZyAEbfTZZmw:/MjtA83xUm7LT7vynf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 696f6e0082b637a5495bb6911e2f5ffc
Files
-
696f6e0082b637a5495bb6911e2f5ffc.exe windows:4 windows x86 arch:x86
0206c62e428ad5023cdb5e382ae8da50
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
oleaut32
VariantChangeType
SafeArrayUnaccessData
OleLoadPicture
kernel32
LoadLibraryA
GetProcessHeap
Sleep
LoadResource
ResetEvent
ReadFile
HeapDestroy
GetSystemDefaultLangID
ExitProcess
GetTickCount
SetEndOfFile
GetCurrentThread
GetUserDefaultLCID
GetDateFormatA
GetFullPathNameA
VirtualQuery
HeapAlloc
GetACP
InitializeCriticalSection
GetVersionExA
MoveFileExA
GetStdHandle
GetEnvironmentStrings
SizeofResource
GetFileType
FreeLibrary
FindClose
GetThreadLocale
LocalFree
CreateThread
SetHandleCount
GlobalAlloc
lstrlenA
GlobalFindAtomA
GetCurrentThreadId
lstrcatA
HeapFree
lstrcpynA
LoadLibraryExA
VirtualFree
lstrcmpiA
SetThreadLocale
lstrcpyA
SetErrorMode
GetStringTypeA
WaitForSingleObject
FindResourceA
GetModuleHandleA
LocalReAlloc
GlobalDeleteAtom
GetModuleFileNameA
MoveFileA
SetLastError
LocalAlloc
VirtualAlloc
RaiseException
GetCPInfo
DeleteCriticalSection
GetFileAttributesA
CreateEventA
SetEvent
WriteFile
GlobalAddAtomA
lstrcmpA
GetStartupInfoA
GetCurrentProcess
EnumCalendarInfoA
ExitThread
GetLastError
GetLocaleInfoA
LockResource
SetFilePointer
FormatMessageA
CloseHandle
FindFirstFileA
GetCurrentProcessId
EnterCriticalSection
MulDiv
GetLocalTime
GetProcAddress
VirtualAllocEx
WideCharToMultiByte
GetOEMCP
CreateFileA
FreeResource
GetVersion
GetStringTypeW
GetFileSize
comctl32
ImageList_Create
ImageList_Write
shlwapi
SHDeleteKeyA
PathGetCharTypeA
SHEnumValueA
PathIsContentTypeA
SHDeleteValueA
SHGetValueA
PathIsDirectoryA
SHStrDupA
SHQueryInfoKeyA
PathFileExistsA
comdlg32
GetFileTitleA
GetSaveFileNameA
ChooseColorA
FindTextA
GetOpenFileNameA
gdi32
GetCurrentPositionEx
ole32
ReleaseStgMedium
CoTaskMemFree
CLSIDFromProgID
CoCreateInstanceEx
CreateOleAdviseHolder
CoGetContextToken
advapi32
RegCreateKeyExA
user32
IsWindowVisible
DeferWindowPos
GetClipboardData
EnableMenuItem
EnumWindows
CreateMenu
BeginPaint
GetDC
CharLowerBuffA
FindWindowA
SetWindowPos
GetClassInfoA
GetMenuState
DrawFrameControl
EqualRect
SetWindowTextA
EndDeferWindowPos
DrawTextA
GetFocus
GetWindow
CallWindowProcA
IsWindowEnabled
BeginDeferWindowPos
GetClassLongA
DrawIcon
ShowWindow
SetTimer
HideCaret
GetCapture
GetScrollRange
GetDCEx
DispatchMessageA
DefMDIChildProcA
CreateWindowExA
GetMenuItemID
DrawIconEx
GetDesktopWindow
GetScrollPos
EnableWindow
GetSysColorBrush
ClientToScreen
GetScrollInfo
CharLowerA
SystemParametersInfoA
GetParent
EnumChildWindows
GetIconInfo
IsDialogMessageA
GetWindowTextA
FillRect
GetActiveWindow
CallNextHookEx
DrawMenuBar
CharNextA
EndPaint
GetSubMenu
TrackPopupMenu
GetMenuItemInfoA
IsChild
DefFrameProcA
DefWindowProcA
FrameRect
GetMenu
EnumThreadWindows
GetMenuItemCount
GetForegroundWindow
CharToOemA
GetPropA
GetCursor
DispatchMessageW
GetMenuStringA
msvcrt
malloc
sqrt
calloc
wcstol
memset
wcsncmp
memcpy
rand
time
sprintf
exit
wcschr
strlen
memmove
mbstowcs
version
VerInstallFileA
VerFindFileA
VerQueryValueA
Sections
text Size: 31KB - Virtual size: 30KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 121KB - Virtual size: 193KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DATA Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1024B - Virtual size: 806B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE