Static task
static1
Behavioral task
behavioral1
Sample
01841d3550128c9e0d7c0dd90305e643.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
01841d3550128c9e0d7c0dd90305e643.exe
Resource
win10v2004-20231215-en
General
-
Target
01841d3550128c9e0d7c0dd90305e643
-
Size
256KB
-
MD5
01841d3550128c9e0d7c0dd90305e643
-
SHA1
46bf1ecde63a2cdc808c7d01e9642e111f03b8c4
-
SHA256
e761d78d9fd23e694b549e69bc02ec6aad61bff98327023779c9cb2debd38d81
-
SHA512
d6db35c5168c8914238790236a894c4a92f881dd6e7a710ea383a8a0f17f7897258dac901453ce48b17ada14180cd768c255a5ddbc143858e0c8574320df9e97
-
SSDEEP
6144:vgaJU8SvhvFynuUZteO99LOMuDr/rumZq:DDSvh9yuYUObLOMiX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 01841d3550128c9e0d7c0dd90305e643
Files
-
01841d3550128c9e0d7c0dd90305e643.exe windows:4 windows x86 arch:x86
2cac03f712463d0c66251f48f126d902
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLastError
OutputDebugStringA
SuspendThread
CreateProcessA
ResumeThread
WriteProcessMemory
OpenProcess
ReadProcessMemory
SetCurrentDirectoryA
RaiseException
GetModuleFileNameA
CompareStringW
CompareStringA
GetOEMCP
GetACP
GetCPInfo
OpenMutexA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
MultiByteToWideChar
SetStdHandle
FlushFileBuffers
SetFilePointer
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
CreateMutexA
FormatMessageA
LocalFree
CreateEventA
WaitForSingleObject
WaitForMultipleObjectsEx
CreateThread
GetCurrentThread
SetEnvironmentVariableA
MulDiv
LocalAlloc
WriteFile
ReadFile
GetFileSize
CreateFileA
ResetEvent
GetCurrentDirectoryA
FindFirstFileA
FindClose
TerminateProcess
Sleep
GetExitCodeProcess
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
LeaveCriticalSection
GetCurrentProcess
lstrlenA
DuplicateHandle
CloseHandle
DeleteFileA
SetFileAttributesA
FindNextFileA
MoveFileA
RemoveDirectoryA
GetProcAddress
FreeLibrary
LoadLibraryA
GetTickCount
FileTimeToDosDateTime
GetSystemTimeAsFileTime
GetFileAttributesA
CreateDirectoryA
GetVersion
HeapFree
HeapAlloc
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
ExitProcess
SetEndOfFile
InterlockedDecrement
InterlockedIncrement
HeapReAlloc
HeapSize
GetCurrentThreadId
TlsSetValue
TlsAlloc
SetLastError
TlsGetValue
RtlUnwind
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
user32
LoadIconA
RegisterClassExA
CreateWindowExA
UpdateWindow
PeekMessageA
TranslateMessage
DispatchMessageA
BeginPaint
EndPaint
DefWindowProcA
GetClientRect
LoadCursorA
SetCursor
SetWindowTextA
MessageBeep
GetWindowRect
SendMessageTimeoutA
IsWindowVisible
ShowWindow
SetForegroundWindow
BringWindowToTop
AdjustWindowRectEx
IsIconic
SystemParametersInfoA
MoveWindow
MessageBoxA
GetDesktopWindow
GetActiveWindow
GetTabbedTextExtentA
GetDC
ReleaseDC
wsprintfA
GetForegroundWindow
GetWindowThreadProcessId
GetWindowLongA
EnumThreadWindows
EnumWindows
PostMessageA
gdi32
SetBkMode
CreateDIBSection
GetObjectA
BitBlt
CreateCompatibleDC
DeleteDC
CreateSolidBrush
CreatePen
Rectangle
LPtoDP
SetTextColor
TextOutA
CreateFontA
SelectObject
DeleteObject
advapi32
CryptReleaseContext
RegOpenKeyExA
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
CryptAcquireContextA
CryptDestroyHash
CryptDestroyKey
CryptVerifySignatureA
CryptImportKey
CryptHashData
CryptCreateHash
winmm
timeGetTime
raw_005.wdt
?IsActivityTrackerEnabled@@YA_NXZ
?HasBeenActivitySinceLastReset@@YA_NXZ
?ResetActivityCheck@@YAXXZ
?EnableActivityTracker@@YA_N_N@Z
imagehlp
MapAndLoad
UnMapAndLoad
comctl32
_TrackMouseEvent
Sections
.text Size: 156KB - Virtual size: 152KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 36KB - Virtual size: 49KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 40KB - Virtual size: 37KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.FFF Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE