Static task
static1
Behavioral task
behavioral1
Sample
1cf91c37d9d0b750e9f043a6b9178762.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1cf91c37d9d0b750e9f043a6b9178762.exe
Resource
win10v2004-20231215-en
General
-
Target
1cf91c37d9d0b750e9f043a6b9178762
-
Size
227KB
-
MD5
1cf91c37d9d0b750e9f043a6b9178762
-
SHA1
2c5fa96b7cb0011f009c253aa331763d98bd0da4
-
SHA256
cec31d2871b103156db3c66ee09463a020e1c950b2dcc73ce69f81d192c62f0f
-
SHA512
39be403d5735dc80d83fe0dc84a81dbb1142f230746fa68882b6e3982c17cb8b2ea3e35b2da577da63a486b93f0668c12f22d9dc36f4ccf6a588999c55ab54ec
-
SSDEEP
3072:MFVxl+5i5wLY14GtOuNgspnOD/4S21dA+MXVaIE/7g0quxsnAD/t1jUIyl:0Dlv5wLYZtOyCkdAXao0qOssF1AIm
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1cf91c37d9d0b750e9f043a6b9178762
Files
-
1cf91c37d9d0b750e9f043a6b9178762.exe windows:4 windows x86 arch:x86
a34f5e0a526574b611685335518e72a4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
ExtractAssociatedIconExA
ExtractAssociatedIconW
ExtractIconA
InternalExtractIconListW
SHGetNewLinkInfo
SheChangeDirExW
SHAddToRecentDocs
SHBrowseForFolderW
SHBrowseForFolderA
ShellHookProc
user32
BlockInput
MonitorFromPoint
UnregisterHotKey
BroadcastSystemMessageW
ActivateKeyboardLayout
GetPropA
EnumDisplayMonitors
SendDlgItemMessageW
LookupIconIdFromDirectoryEx
SetUserObjectInformationW
RegisterHotKey
IsCharUpperA
CloseWindow
CreatePopupMenu
CharNextA
CreateWindowStationW
advapi32
CryptDuplicateHash
RegCloseKey
RegCreateKeyExA
RegQueryValueExW
CryptAcquireContextW
RegQueryMultipleValuesA
ReportEventA
comdlg32
PageSetupDlgW
PrintDlgW
FindTextA
GetFileTitleA
PrintDlgA
kernel32
lstrlen
WideCharToMultiByte
GetFileType
InitializeCriticalSection
GetEnvironmentStrings
FreeEnvironmentStringsW
IsBadWritePtr
IsValidCodePage
HeapDestroy
VirtualProtect
GetStringTypeW
CreateSemaphoreW
GetStartupInfoA
GetSystemTimeAsFileTime
CompareStringW
VirtualAlloc
SetConsoleTextAttribute
TerminateProcess
DeleteCriticalSection
CompareStringA
HeapCreate
TlsAlloc
GetLastError
GetTimeFormatA
TlsSetValue
TlsFree
ExitProcess
GetProcAddress
SetEnvironmentVariableW
EnumCalendarInfoA
GetOEMCP
VirtualQuery
IsValidLocale
SetEnvironmentVariableA
GetCommandLineA
LoadLibraryA
RtlUnwind
GetWindowsDirectoryA
UnhandledExceptionFilter
LockFileEx
VirtualFree
LoadResource
GetLocaleInfoW
GetModuleFileNameA
GetDateFormatA
EnterCriticalSection
LeaveCriticalSection
EnumSystemLocalesA
GetStdHandle
GetThreadPriorityBoost
GetTimeZoneInformation
SetHandleCount
RemoveDirectoryW
GetCurrentProcessId
CommConfigDialogA
QueryPerformanceCounter
MultiByteToWideChar
WriteProfileSectionA
WriteFile
GetVersionExA
TerminateThread
WriteConsoleOutputA
GetCurrentThread
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
GetEnvironmentStringsW
TlsGetValue
LCMapStringA
GetCurrentProcess
GetACP
EnumSystemCodePagesW
GetSystemInfo
GetUserDefaultLCID
GetCPInfo
InterlockedExchange
LCMapStringW
GetModuleHandleA
GetTickCount
SetLastError
GetLocaleInfoA
GetLogicalDriveStringsA
GetCurrentThreadId
FreeEnvironmentStringsA
GetStringTypeA
UnlockFile
Sections
.text Size: 108KB - Virtual size: 108KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 110KB - Virtual size: 137KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ