Static task
static1
Behavioral task
behavioral1
Sample
1d64795c0f65bd42cfe997bfac7e6012.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1d64795c0f65bd42cfe997bfac7e6012.exe
Resource
win10v2004-20231215-en
General
-
Target
1d64795c0f65bd42cfe997bfac7e6012
-
Size
750KB
-
MD5
1d64795c0f65bd42cfe997bfac7e6012
-
SHA1
2cdc3e84e78d7468ae09a685efbeed1ed080970c
-
SHA256
268a32782fab8e984ca836168abbe622a25efbbbb650ebecef8fe9b8f969e80b
-
SHA512
e3f276398c3bb474f5dab007ffc34f240ca81cb7dc4d7582a1c64f1647e746eed84e36fb13583bbb42690c4e5e08c364b99f31007c8cf86395071d8309c1ddac
-
SSDEEP
12288:1fmuL8EXtAPQ//H10gjHzfNK55fRXLgpW4g580uZb8bckyVsFyzgFhh2Mj9o0:1euLAY//H1LHz0vfVu1f6AS8Ihh7u0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1d64795c0f65bd42cfe997bfac7e6012
Files
-
1d64795c0f65bd42cfe997bfac7e6012.exe windows:5 windows x86 arch:x86
74556c3d2d30d4b65eb21185fd13000f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
EnumResourceNamesW
HeapReAlloc
lstrlenA
WritePrivateProfileStructA
GetModuleHandleExA
SetLocalTime
GetDriveTypeW
SetEndOfFile
CallNamedPipeA
_lwrite
InterlockedDecrement
WritePrivateProfileSectionA
CreateDirectoryW
GlobalLock
GetProfileSectionA
WaitForSingleObject
SetVolumeMountPointW
OpenSemaphoreA
GetModuleHandleW
CreateNamedPipeW
ReadConsoleW
EnumTimeFormatsA
CreateActCtxW
CreateDirectoryExW
GetPriorityClass
GlobalAlloc
GetVolumeInformationA
LoadLibraryW
GetConsoleMode
Sleep
ReadConsoleInputA
CopyFileW
_hread
GetVersionExW
GetComputerNameExA
SetConsoleMode
Beep
SetConsoleCursorPosition
GetBinaryTypeA
TerminateProcess
GetAtomNameW
ReadFile
GetModuleFileNameW
CreateFileW
CompareStringW
FillConsoleOutputCharacterA
SetConsoleTitleA
VerifyVersionInfoW
GlobalUnfix
FindFirstFileA
GetCPInfoExW
OpenMutexW
GetHandleInformation
IsDBCSLeadByteEx
GetCurrentDirectoryW
GetThreadLocale
ReadConsoleOutputCharacterA
GetProcAddress
GetProcessHeaps
IsValidCodePage
CopyFileA
SetComputerNameA
BuildCommDCBW
ResetEvent
ProcessIdToSessionId
UnhandledExceptionFilter
OpenWaitableTimerW
GetFileType
IsSystemResumeAutomatic
AddAtomW
SetCurrentDirectoryW
GetCommMask
GetPrivateProfileStructA
SetEnvironmentVariableA
WTSGetActiveConsoleSessionId
CreateIoCompletionPort
FreeEnvironmentStringsW
CompareStringA
SetCalendarInfoA
_lopen
ReadConsoleInputW
LocalSize
InterlockedPushEntrySList
TlsFree
LCMapStringW
CopyFileExA
CloseHandle
SetStdHandle
GetConsoleCP
SetFilePointer
GetACP
GetTempFileNameW
InterlockedIncrement
EncodePointer
DecodePointer
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapValidate
IsBadReadPtr
GetLastError
DeleteFileA
GetCommandLineW
HeapSetInformation
GetStartupInfoW
RtlUnwind
RaiseException
WideCharToMultiByte
MultiByteToWideChar
GetCPInfo
ExitProcess
GetCurrentProcess
SetUnhandledExceptionFilter
IsDebuggerPresent
WriteFile
GetStdHandle
InitializeCriticalSectionAndSpinCount
HeapAlloc
GetModuleFileNameA
HeapSize
HeapQueryInformation
HeapFree
HeapCreate
GetOEMCP
TlsAlloc
TlsGetValue
TlsSetValue
GetCurrentThreadId
SetLastError
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
SetHandleCount
GetLocaleInfoW
IsProcessorFeaturePresent
OutputDebugStringA
WriteConsoleW
OutputDebugStringW
GetStringTypeW
GetLocaleInfoA
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
FlushFileBuffers
user32
GetCursorInfo
GetListBoxInfo
GetComboBoxInfo
GetMenuBarInfo
advapi32
AdjustTokenPrivileges
Sections
.text Size: 666KB - Virtual size: 666KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 57KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 22KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 25KB - Virtual size: 137KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ