Static task
static1
Behavioral task
behavioral1
Sample
03218d3904f29ec4bc0380b92e734f15.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
03218d3904f29ec4bc0380b92e734f15.exe
Resource
win10v2004-20231215-en
General
-
Target
03218d3904f29ec4bc0380b92e734f15
-
Size
364KB
-
MD5
03218d3904f29ec4bc0380b92e734f15
-
SHA1
a1d3889fa5acbdeedfed7a405ba74a7f8131cf65
-
SHA256
a968e0672e7f7cacdaac0837a866f8f8922726803cf9d3172210080816a90cc8
-
SHA512
6a42f54798533d5bbb843f777333b5e6b3106ae8a04df201adc045c439479c0aba773661cbfdbbeeef56116becfe1499b3243218c427f84464723440cd5ee59b
-
SSDEEP
6144:n/YF/EVEgWl7iNmXmuIcFrrz9QJG0tUDD2T:n/wEVVQ28XmuIctrz9MG0232
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 03218d3904f29ec4bc0380b92e734f15
Files
-
03218d3904f29ec4bc0380b92e734f15.exe windows:4 windows x86 arch:x86
385eb2bb33edc453b6d156db2d1c9f24
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTickCount
VirtualAlloc
SetLastError
GetStartupInfoA
VirtualProtect
TlsGetValue
InterlockedExchange
WriteFile
IsValidLocale
OpenMutexA
SetHandleCount
GetLastError
GetStringTypeW
FreeEnvironmentStringsA
GetOEMCP
SetEnvironmentVariableA
RtlUnwind
GetModuleHandleA
MapViewOfFileEx
TlsAlloc
WriteConsoleOutputW
GetCommandLineW
CloseHandle
GetCurrentProcess
CompareStringW
TlsSetValue
HeapCreate
WideCharToMultiByte
GetEnvironmentStringsW
GetCurrentProcessId
GetUserDefaultLangID
SetThreadPriority
HeapFree
IsValidCodePage
ExitProcess
HeapAlloc
OpenFileMappingW
GetFileAttributesExW
EnumSystemLocalesA
GetCurrentThreadId
FreeEnvironmentStringsW
EnterCriticalSection
CreateMutexA
InitializeCriticalSection
GetStdHandle
FlushFileBuffers
GetTimeZoneInformation
lstrcmpA
GetLocaleInfoW
OpenSemaphoreW
VirtualFree
GetProcAddress
VirtualQuery
GetCommandLineA
TlsFree
HeapReAlloc
LoadLibraryA
IsBadWritePtr
GetModuleFileNameW
GetVersionExA
HeapDestroy
FreeResource
UnhandledExceptionFilter
GetSystemTimeAsFileTime
SetFilePointer
LCMapStringW
GetDateFormatA
GetSystemInfo
InterlockedIncrement
LeaveCriticalSection
TerminateProcess
GetFileType
GetStartupInfoW
GetTimeFormatA
ReadFile
GetModuleFileNameA
GetCPInfo
WaitNamedPipeW
GetACP
GetStringTypeA
QueryPerformanceCounter
WritePrivateProfileStructW
SetComputerNameW
GetLocaleInfoA
CommConfigDialogA
GetThreadContext
DeleteCriticalSection
GetUserDefaultLCID
CompareStringA
MultiByteToWideChar
GetEnvironmentStrings
GetStringTypeExA
GetCurrentThread
SetStdHandle
HeapSize
LCMapStringA
advapi32
InitiateSystemShutdownW
RegRestoreKeyA
RegCreateKeyExW
RegConnectRegistryA
RegLoadKeyW
RegEnumKeyExW
CryptSetProviderW
InitializeSecurityDescriptor
CryptExportKey
wininet
FtpSetCurrentDirectoryW
user32
RegisterClassA
SetProcessDefaultLayout
SetClassLongA
SetDoubleClickTime
EndPaint
CharPrevW
DefWindowProcW
DrawTextExW
ChangeDisplaySettingsW
RegisterClassExA
CreateWindowExW
SetUserObjectInformationA
ShowWindow
GetWindowDC
RegisterWindowMessageA
MessageBoxW
RegisterWindowMessageW
SetCaretBlinkTime
DestroyWindow
GetTitleBarInfo
SetActiveWindow
LoadMenuW
GetAltTabInfo
shell32
RealShellExecuteA
SheGetDirA
ExtractAssociatedIconExW
FreeIconList
SHGetDataFromIDListW
comctl32
ImageList_Create
DrawStatusTextW
InitCommonControlsEx
ImageList_LoadImage
ImageList_GetIcon
ImageList_SetOverlayImage
ImageList_SetDragCursorImage
ImageList_SetBkColor
MakeDragList
_TrackMouseEvent
DestroyPropertySheetPage
ImageList_Copy
ImageList_DrawIndirect
ImageList_DragEnter
ImageList_ReplaceIcon
ImageList_SetImageCount
ImageList_GetIconSize
ImageList_SetFlags
ImageList_DrawEx
CreateStatusWindow
ImageList_Replace
comdlg32
PrintDlgW
Sections
.text Size: 132KB - Virtual size: 130KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 68KB - Virtual size: 65KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 96KB - Virtual size: 109KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 64KB - Virtual size: 61KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ