Static task
static1
Behavioral task
behavioral1
Sample
717191109bc4eab59c4719b1daaa2798.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
717191109bc4eab59c4719b1daaa2798.exe
Resource
win10v2004-20231222-en
General
-
Target
717191109bc4eab59c4719b1daaa2798
-
Size
174KB
-
MD5
717191109bc4eab59c4719b1daaa2798
-
SHA1
cc0a463044c8b41a77848a882cc37aee208ba25a
-
SHA256
e0362b8e79617da9440e6a7d217e37800eaa22f1b6688aca90613db35ffa925b
-
SHA512
352140ff21f6b0a96841f793aae192eeae1007f62bea0fdbfee2d1274a4b8b83d5782f61b5976e528b53032ef4b2c90336a79b1189ff670eda0383ac32cfbb60
-
SSDEEP
3072:iOjxIKGzmH6Zfz0wWfQ62cfB/f+XArySt3qxiJ:1jOLzmiL0wWH2GWArysqu
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 717191109bc4eab59c4719b1daaa2798
Files
-
717191109bc4eab59c4719b1daaa2798.exe windows:5 windows x86 arch:x86
6a035edca9173f69375f99bde1ecfd4d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTickCount
OpenProcess
Sleep
ReadProcessMemory
GetConsoleWindow
SetConsoleTitleA
GetStdHandle
GetLastError
GetProcAddress
GetConsoleScreenBufferInfo
GetModuleHandleA
CloseHandle
WaitForSingleObject
CreateThread
SetEndOfFile
SetEnvironmentVariableA
CompareStringW
CreateFileW
CreateFileA
CreateProcessA
GetExitCodeProcess
WriteConsoleW
SetStdHandle
LoadLibraryW
GetCurrentProcess
SetConsoleTextAttribute
WriteProcessMemory
HeapReAlloc
IsValidLocale
WideCharToMultiByte
InterlockedIncrement
InterlockedDecrement
InterlockedExchange
MultiByteToWideChar
EncodePointer
DecodePointer
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapFree
HeapAlloc
GetCommandLineA
HeapSetInformation
GetCPInfo
RaiseException
RtlUnwind
LCMapStringW
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
GetStartupInfoW
IsProcessorFeaturePresent
HeapCreate
GetModuleHandleW
ExitProcess
WriteFile
GetModuleFileNameW
ReadFile
SetFilePointer
GetConsoleCP
GetConsoleMode
FlushFileBuffers
GetFileAttributesA
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
GetACP
GetOEMCP
IsValidCodePage
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetStringTypeW
GetLocaleInfoW
HeapSize
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
GetProcessHeap
user32
FindWindowA
keybd_event
GetForegroundWindow
GetAsyncKeyState
ShowWindow
psapi
GetModuleFileNameExA
EnumProcessModules
GetModuleBaseNameA
EnumProcesses
advapi32
LookupPrivilegeValueA
OpenProcessToken
AdjustTokenPrivileges
winmm
PlaySoundA
Sections
.text Size: 126KB - Virtual size: 125KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 30KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 448B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ