Static task
static1
Behavioral task
behavioral1
Sample
0229614570a89ec1127f8c237a91611a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0229614570a89ec1127f8c237a91611a.exe
Resource
win10v2004-20231222-en
General
-
Target
0229614570a89ec1127f8c237a91611a
-
Size
29KB
-
MD5
0229614570a89ec1127f8c237a91611a
-
SHA1
4109a6fc5c17117f19ce3b354f9a4ee47be323a0
-
SHA256
dc90603e8684899d7e1f8bfefbe6a0367fbd964bad74b32a0ea007b946076c98
-
SHA512
e15b768dd0cccdd08f97fca06849ccfd5cafd4ca9377673185fdb354521b4e29d2122b6f85ccf97bf0f1b071d588cb0194fb09c1657ea7378360d7d80c69e70b
-
SSDEEP
384:a02egeszkcKv8ohyBConR4gxH5OCg1eAXm+9xDH/+rLS0pCmVHh:zsrohyrnegnOJeAW+fD/qLS0A0Hh
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0229614570a89ec1127f8c237a91611a
Files
-
0229614570a89ec1127f8c237a91611a.exe windows:4 windows x86 arch:x86
6bd32a3acdb7646039ca92216b17bbb8
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WaitForSingleObject
CreateProcessA
ExitProcess
lstrcpyA
RemoveDirectoryA
VirtualFree
CloseHandle
lstrcmpA
VirtualAlloc
CompareStringA
WritePrivateProfileStringA
FindNextFileA
GetCurrentDirectoryA
GetFullPathNameA
FindClose
GetPrivateProfileStringA
GetPrivateProfileIntA
MoveFileExA
CopyFileA
FreeLibrary
GetProcAddress
LoadLibraryA
ReadFile
SetFilePointer
GetFileSize
CreateFileA
GetTempPathA
GetWindowsDirectoryA
GetModuleFileNameA
InterlockedIncrement
FindFirstFileA
SetCurrentDirectoryA
lstrcpynA
lstrcatA
DeleteFileA
SetFileAttributesA
SetStdHandle
GetLastError
HeapAlloc
GetStringTypeW
GetStringTypeA
FlushFileBuffers
lstrlenA
GetModuleHandleA
HeapFree
WriteFile
HeapCreate
GetStdHandle
GetFileType
SetHandleCount
GetOEMCP
GetACP
GetCPInfo
WideCharToMultiByte
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
MultiByteToWideChar
FreeEnvironmentStringsA
GetVersion
GetCommandLineA
UnhandledExceptionFilter
GetStartupInfoA
RtlUnwind
user32
DdeUninitialize
DdeInitializeA
SendDlgItemMessageA
DdeDisconnect
DdeFreeStringHandle
DdeFreeDataHandle
DialogBoxParamA
FindWindowA
EndDialog
ShowWindow
GetWindowLongA
LoadIconA
SetClassLongA
SetWindowTextA
GetWindowRect
SetWindowPos
SetDlgItemTextA
PostMessageA
GetDlgItem
DdeCreateDataHandle
DdeCreateStringHandleA
DdeConnect
wsprintfA
DdeClientTransaction
MessageBoxA
CharLowerA
EnableWindow
advapi32
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
RegCreateKeyExA
RegDeleteKeyA
RegDeleteValueA
Sections
.text Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 113B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.Shared Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ