Static task
static1
Behavioral task
behavioral1
Sample
1.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1.exe
Resource
win10v2004-20231215-en
General
-
Target
76af767b562928b7010c188e01620009
-
Size
621KB
-
MD5
76af767b562928b7010c188e01620009
-
SHA1
6d9dbbdd3d7d9e90299dee777c0686abc80c5382
-
SHA256
57e410d4920e3d9d6e865ea9956a44f945fd37ebfef1d0ee6765e4199db793c0
-
SHA512
9f628d56c8246d449effcdbf8dd86077d83d52c89df59e804a85743ebb514c8fd6f41ec5246ea9fe4aad66c1b64c4946e1922cf483994740be3d678f4d527821
-
SSDEEP
12288:MmsRiQ/WcxbXuZhF8HCEQ9rESxtMId3BLFIV14v5c1aSnEHQZQtG3HDYT:MmswEbMcwxIYhCn4v5cIS0oQOK
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/1.exe
Files
-
76af767b562928b7010c188e01620009.rar
-
1.exe.exe windows:2 windows x86 arch:x86
e6995d1e97f9a636483c27ed913c1345
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetNumberFormatW
lstrlen
lstrlenA
lstrcatA
SetErrorMode
GetLocalTime
BeginUpdateResourceW
GetVersionExA
OpenWaitableTimerW
GetCurrentDirectoryW
LoadLibraryA
FindAtomA
RaiseException
GetSystemDirectoryA
GetEnvironmentVariableA
CreateNamedPipeA
GetExpandedNameA
EnumDateFormatsA
FileTimeToLocalFileTime
FindAtomW
GetAtomNameA
FlushFileBuffers
SetEvent
GetLogicalDriveStringsA
CopyFileExW
GetFileAttributesA
SetCalendarInfoW
CloseHandle
GetFullPathNameA
WaitForSingleObject
GlobalAlloc
GetModuleHandleW
FatalAppExitA
GetModuleHandleA
GetProcAddress
GlobalDeleteAtom
lstrcpyA
CreateDirectoryW
GetVolumeInformationW
MulDiv
WinExec
lstrcmpiW
GetWindowsDirectoryA
lstrcpyW
GetCalendarInfoW
user32
GetMenuItemCount
DefWindowProcW
GetDlgItemTextA
SetCapture
MonitorFromPoint
LoadMenuA
GetWindowTextA
GetScrollPos
GetWindowLongA
EnumClipboardFormats
IsChild
DestroyMenu
UpdateWindow
PostMessageA
RegisterWindowMessageA
FindWindowW
GetDC
GetCaretPos
CheckDlgButton
SetWindowLongW
RegisterClassA
GetClassInfoExA
UnregisterClassW
IsMenu
IsWindow
LoadIconW
SetDlgItemTextW
CreateAcceleratorTableW
CopyRect
GetSysColorBrush
GetMenuStringW
CharPrevA
EnumChildWindows
GetActiveWindow
AdjustWindowRect
RegisterClassW
mouse_event
GetDesktopWindow
GetWindowRgn
GetMenuItemID
GetClassLongW
CharNextW
InvalidateRgn
EnumDesktopsW
GetClassNameW
MoveWindow
DefDlgProcW
SetWindowTextW
SetFocus
GetSubMenu
CharUpperW
CreateDialogIndirectParamA
CreateCaret
GetIconInfo
FillRect
CreateDesktopW
SetActiveWindow
DefDlgProcA
GetCapture
GetForegroundWindow
DefFrameProcW
SetDlgItemTextA
GetMenuItemInfoW
MessageBoxIndirectW
CreateWindowExW
OpenClipboard
wvsprintfW
AppendMenuA
DefFrameProcA
CreateDialogParamW
CheckMenuItem
GetClassLongA
SetMenu
gdi32
CreateICA
GetMapMode
GetEnhMetaFileBits
GetStockObject
CreateEllipticRgn
GetCharWidthI
EnumObjects
GetWorldTransform
GetOutlineTextMetricsA
GetGlyphOutlineW
ExtFloodFill
EndPath
PtVisible
GetTextExtentPointI
GetDCBrushColor
CreatePalette
CreateScalableFontResourceA
RemoveFontResourceA
SetTextColor
GetDeviceGammaRamp
SetGraphicsMode
EqualRgn
GdiGetBatchLimit
Chord
GetArcDirection
GetCharWidthW
advapi32
RegQueryInfoKeyW
RegOpenKeyW
RegCloseKey
RegEnumValueW
RegSetValueW
ReportEventA
RegDeleteKeyW
RegReplaceKeyA
RegCreateKeyA
PrivilegedServiceAuditAlarmA
RegQueryValueExA
RegQueryValueA
RegSaveKeyW
shell32
StrStrW
SHGetDesktopFolder
Shell_NotifyIconW
StrNCmpIA
ShellExecuteExA
shlwapi
SHRegQueryInfoUSKeyW
PathSearchAndQualifyA
SHGetValueW
IntlStrEqWorkerA
IntlStrEqWorkerW
StrFormatByteSize64A
SHRegEnumUSValueW
oleaut32
VarI8FromUI1
VarR8FromUI4
VarDecCmp
RegisterTypeLib
VarI2FromUI4
VarDecCmpR8
VarCyFromR8
VarUI1FromDec
ws2_32
WSAEnumNetworkEvents
closesocket
inet_ntoa
WSARecv
WSACloseEvent
WSAEventSelect
send
WSAGetLastError
winmm
PlaySound
winspool.drv
DEVICECAPABILITIES
QuerySpoolMode
AddPrintProcessorW
EnumPrintProcessorsA
EnumPrintProcessorDatatypesA
DevQueryPrintEx
crypt32
I_CryptAddRefLruEntry
CertDuplicateCRLContext
CryptVerifyCertificateSignatureEx
I_CryptDetachTls
CryptAcquireContextU
PFXExportCertStore
Sections
.k Size: 1024B - Virtual size: 44KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.Xv Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.eXGw Size: 1024B - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.PXFF Size: 1024B - Virtual size: 29KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.RNOmgE Size: 1024B - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.aagSa Size: 1KB - Virtual size: 6KB
IMAGE_SCN_MEM_READ
.l Size: 1KB - Virtual size: 38KB
IMAGE_SCN_MEM_READ
.XYKnV Size: 1024B - Virtual size: 34KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 10KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pqQA Size: 1KB - Virtual size: 38KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.LUzHx Size: 1024B - Virtual size: 19KB
IMAGE_SCN_MEM_READ
.QrG Size: 1024B - Virtual size: 5KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 241KB - Virtual size: 240KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ