Static task
static1
Behavioral task
behavioral1
Sample
0229668fb74683e610278c02128d095a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0229668fb74683e610278c02128d095a.exe
Resource
win10v2004-20231215-en
General
-
Target
0229668fb74683e610278c02128d095a
-
Size
513KB
-
MD5
0229668fb74683e610278c02128d095a
-
SHA1
60421b4bfc34607b127b0d7018fea11ea9e0dbfe
-
SHA256
2e0bba260bf6f08fc62d42ed55610f5d1fad94583714e21ebe1a7fc2de49f7bd
-
SHA512
cbb60250ab186e95695046b8bf911bbb0b3a01e880e89153b3dbc375f90507a05d13a754a1043e83d895840e304551b2426d9f608bd6439f5ca6054dded9a6cb
-
SSDEEP
12288:9sNBB6z5ttR1A59RQI1nzB3u6YdJj1M6I8IjGxfaVDixDq:CB6NttRaRQIFw6WJj1E8fx4+xu
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0229668fb74683e610278c02128d095a
Files
-
0229668fb74683e610278c02128d095a.exe windows:4 windows x86 arch:x86
ecdc79933392b2a35843343c14124d85
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
BeginPath
SetPolyFillMode
ColorCorrectPalette
SetDIBits
StartPage
GdiGetBatchLimit
FlattenPath
GetCharWidthFloatW
GetWindowOrgEx
AnimatePalette
GetTextAlign
GetClipBox
StartDocA
DeleteColorSpace
GetTextExtentPoint32A
CancelDC
comctl32
InitCommonControlsEx
user32
RegisterClassA
LoadAcceleratorsW
GetNextDlgTabItem
DdeUninitialize
UpdateWindow
LoadImageW
RegisterClassExA
SubtractRect
SetShellWindow
SetWindowsHookExW
DdeGetData
DdeConnect
GetDlgCtrlID
IsClipboardFormatAvailable
kernel32
ReadFile
SetLastError
SetWaitableTimer
InterlockedExchange
HeapSize
EnterCriticalSection
TransmitCommChar
WaitForMultipleObjectsEx
GetOEMCP
GetModuleFileNameA
SetEnvironmentVariableA
GetTickCount
TlsSetValue
GetModuleFileNameW
GetProcAddress
GetSystemTimeAsFileTime
InitializeCriticalSection
GetStringTypeW
SetThreadAffinityMask
GetFileType
VirtualQueryEx
EnumSystemLocalesA
GetCommandLineW
HeapAlloc
OpenMutexA
TlsFree
GetSystemInfo
FlushConsoleInputBuffer
ExitProcess
SetComputerNameA
GetVersionExA
GetCurrentThread
DeleteCriticalSection
IsBadWritePtr
CloseHandle
WriteConsoleOutputAttribute
MultiByteToWideChar
GetCommandLineA
SetHandleCount
HeapDestroy
ReadConsoleW
IsValidLocale
LoadLibraryA
GetDateFormatA
ConvertDefaultLocale
SetFilePointer
WriteFile
VirtualQuery
FreeEnvironmentStringsW
GetStartupInfoW
LCMapStringW
FreeLibraryAndExitThread
WideCharToMultiByte
GetStdHandle
GetUserDefaultLCID
GetStringTypeA
HeapReAlloc
GetCPInfo
QueryPerformanceCounter
TlsGetValue
GetACP
GetCurrentProcessId
InterlockedExchangeAdd
GetLastError
LCMapStringA
GetTimeFormatA
FreeEnvironmentStringsA
GetModuleHandleA
GetLocaleInfoW
FlushFileBuffers
SetVolumeLabelA
TlsAlloc
CreateMutexA
HeapFree
RtlUnwind
CompareStringA
GetStartupInfoA
GetEnvironmentStringsW
SetStdHandle
GetLocaleInfoA
VirtualProtect
VirtualFree
GetEnvironmentStrings
WriteProfileStringA
TerminateProcess
IsValidCodePage
UnhandledExceptionFilter
GetTimeZoneInformation
GetCurrentThreadId
LeaveCriticalSection
GlobalCompact
HeapCreate
GetCurrentProcess
VirtualAlloc
CompareStringW
advapi32
RegQueryValueExA
RegQueryValueW
RegQueryInfoKeyW
CryptDeriveKey
InitiateSystemShutdownW
AbortSystemShutdownW
LogonUserA
CryptHashData
RegReplaceKeyW
CryptSetProviderExW
RegQueryMultipleValuesA
CryptImportKey
RegLoadKeyW
RegDeleteKeyA
LookupAccountSidA
RegReplaceKeyA
CryptEnumProvidersW
CryptEnumProviderTypesA
RegQueryInfoKeyA
RegFlushKey
RegDeleteValueW
RegConnectRegistryA
ReportEventA
CryptGetDefaultProviderA
Sections
.text Size: 367KB - Virtual size: 367KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 27KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 105KB - Virtual size: 105KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ