Static task
static1
Behavioral task
behavioral1
Sample
f8841268ec943ee7c18ff53f6d141fd0.exe
Resource
win7-20231215-en
General
-
Target
f8841268ec943ee7c18ff53f6d141fd0
-
Size
578KB
-
MD5
f8841268ec943ee7c18ff53f6d141fd0
-
SHA1
80e771f3a48dc4db7a368ff4019a71d7a7e11640
-
SHA256
9ae33a9ddb30f3a6b041f3fe5f97d3f6f771387750165772cdda0ca0c1544664
-
SHA512
22cf02fc562945e5934927d461c8ec3a7ebd705a584b73a2c50aa48f8db435ac09a532890d0ec09170302069d954ae58a06ae08b10f14cbb9f1a5f539b52d001
-
SSDEEP
12288:C9Khg/7ddVtGOWnY/7jShgM4uBg8SyHAEQAz52X0Wx9AmHIR:icqIgMnQMSAF2X0MeR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f8841268ec943ee7c18ff53f6d141fd0
Files
-
f8841268ec943ee7c18ff53f6d141fd0.exe windows:5 windows x86 arch:x86
7159377d7248b4bbf1c63018c2610f82
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleW
InterlockedIncrement
InterlockedDecrement
lstrcmpiW
GetVersionExW
lstrcpynA
lstrlenA
lstrcpynW
FreeLibrary
MultiByteToWideChar
LoadResource
FindResourceW
LoadLibraryExW
GetModuleFileNameW
Sleep
VirtualAlloc
GetProcessHeap
HeapAlloc
VirtualFree
HeapFree
LoadLibraryA
IsBadReadPtr
LockResource
FindResourceExW
WideCharToMultiByte
GetCommandLineW
SetStdHandle
WriteConsoleW
CloseHandle
SetFilePointer
FlushFileBuffers
GetProcAddress
GetConsoleCP
GetStringTypeW
LoadLibraryW
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
LCMapStringW
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
ExitProcess
HeapCreate
GetStdHandle
WriteFile
IsDebuggerPresent
CreateFileW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
LeaveCriticalSection
EnterCriticalSection
lstrlenW
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
GetLastError
RaiseException
GetConsoleMode
SizeofResource
InterlockedPushEntrySList
IsProcessorFeaturePresent
HeapDestroy
HeapReAlloc
HeapSize
RtlUnwind
DecodePointer
EncodePointer
HeapSetInformation
GetStartupInfoW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
user32
DefWindowProcW
CharNextW
SetWindowLongW
GetWindowLongW
IsWindow
TrackPopupMenuEx
PeekMessageW
PtInRect
MessageBeep
SetWindowPos
CallWindowProcW
RemoveMenu
AppendMenuW
MonitorFromPoint
GetMonitorInfoW
CreatePopupMenu
GetMenuItemCount
DestroyMenu
LoadStringA
PostQuitMessage
SetFocus
LoadStringW
InvalidateRect
GetWindowRect
TranslateAcceleratorW
SetMenuDefaultItem
GetMenuItemInfoW
SetMenuItemInfoW
MapWindowPoints
GetClientRect
SendMessageW
ole32
CoTaskMemRealloc
CoCreateInstance
CoTaskMemFree
CoTaskMemAlloc
oleaut32
VarUI4FromStr
advapi32
RegQueryInfoKeyW
RegSetValueExW
RegCloseKey
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExW
RegOpenKeyExW
RegEnumKeyExW
Sections
.text Size: 106KB - Virtual size: 106KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 420KB - Virtual size: 420KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ