Static task
static1
Behavioral task
behavioral1
Sample
05a6c372304cbdaefc16f1a0e7f1eec7.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
05a6c372304cbdaefc16f1a0e7f1eec7.exe
Resource
win10v2004-20231215-en
General
-
Target
05a6c372304cbdaefc16f1a0e7f1eec7
-
Size
473KB
-
MD5
05a6c372304cbdaefc16f1a0e7f1eec7
-
SHA1
131263fefadd10182094603d0c269b2df4d2cfa6
-
SHA256
c13dac58a58c099b4d5066eebe73abf1cb255ed20cac58c54afd0c92c6446dcc
-
SHA512
1fd6dc3dee5841d0829a4801d2c082b97ef05d0ccabd27682425ddaee0f06ffc929bc57dc9682d856a6758fab9e5b7a771c4810b8e64324cd0e45cea46622f1c
-
SSDEEP
6144:1g0/pQZe7/GVrX56MAbNWvbYIfx9A61MOSAR4UM4BEzFUznmZWvCHeX+00chT8WD:1P/4hc+pdR4UMtyBVfhAK0e
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 05a6c372304cbdaefc16f1a0e7f1eec7
Files
-
05a6c372304cbdaefc16f1a0e7f1eec7.exe windows:4 windows x86 arch:x86
1bd4b80559c4fc905920b2b140e4d69f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetMenuBarInfo
PeekMessageW
DrawEdge
RegisterClassExA
GetTitleBarInfo
SetTimer
DdeAbandonTransaction
RegisterClassA
PeekMessageA
GetMenuItemID
RedrawWindow
EnumWindowStationsA
EnumDesktopsW
SetMenuItemInfoW
SetWindowTextW
GetClipboardOwner
GetQueueStatus
PostThreadMessageA
comctl32
InitCommonControlsEx
gdi32
CreateScalableFontResourceW
StrokeAndFillPath
GetDCOrgEx
ArcTo
TextOutW
SetTextCharacterExtra
StartPage
ColorMatchToTarget
RestoreDC
CreateFontIndirectA
UpdateICMRegKeyA
FillPath
BitBlt
GetTextExtentExPointW
kernel32
GetCurrentProcessId
GetEnvironmentStrings
VirtualQuery
GetTickCount
OutputDebugStringW
TlsSetValue
HeapAlloc
HeapCreate
CompareStringW
GetStartupInfoW
GetStdHandle
InitializeCriticalSection
OpenMutexA
GetEnvironmentStringsW
GetSystemTime
GetFileType
GetProcAddress
HeapReAlloc
FreeEnvironmentStringsW
LoadLibraryA
GetModuleFileNameW
TlsFree
GetStartupInfoA
MultiByteToWideChar
TerminateProcess
HeapDestroy
InterlockedExchange
WriteFile
EnumTimeFormatsW
FreeEnvironmentStringsA
SetFilePointer
SetStdHandle
HeapFree
VirtualFree
ExitProcess
CreateMutexA
DeleteCriticalSection
GetTimeZoneInformation
SetLastError
GetModuleFileNameA
IsBadWritePtr
GetStringTypeA
LeaveCriticalSection
GetStringTypeW
TlsGetValue
GetComputerNameA
LCMapStringA
CompareStringA
SetEnvironmentVariableA
QueryPerformanceCounter
RtlUnwind
GetCommandLineA
GetCurrentThreadId
GetCommandLineW
GetCurrentThread
WideCharToMultiByte
GetSystemTimeAsFileTime
UnhandledExceptionFilter
VirtualAlloc
GetCurrentProcess
GetCPInfo
InterlockedIncrement
FlushFileBuffers
SetHandleCount
ReadFile
EnumResourceLanguagesW
GetLastError
LCMapStringW
GetModuleHandleA
EnterCriticalSection
GetVersion
TlsAlloc
CloseHandle
InterlockedDecrement
GetLocalTime
comdlg32
GetOpenFileNameA
PageSetupDlgW
ReplaceTextW
FindTextW
wininet
InternetConfirmZoneCrossingW
InternetSetOptionExA
FindNextUrlCacheGroup
Sections
.text Size: 146KB - Virtual size: 146KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 308KB - Virtual size: 307KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ