Static task
static1
Behavioral task
behavioral1
Sample
1ffb5c5594760986132e958faa71d2db.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1ffb5c5594760986132e958faa71d2db.exe
Resource
win10v2004-20231215-en
General
-
Target
1ffb5c5594760986132e958faa71d2db
-
Size
228KB
-
MD5
1ffb5c5594760986132e958faa71d2db
-
SHA1
05fbf79ef2f95d4db7dbb6f899c4a9c55d935758
-
SHA256
4a12004c06dedfa85157d50e7d017af478f5267e7cd4c99555e827e8d7b767a4
-
SHA512
7a7752afcd50fb9d9f07b5ab16ab5acf4eb78a33c12056b813976a439264db29b62d71aac06ccda3a78eab10e841488d4a8fddca63fc6bbd6f5db51b2e2f2490
-
SSDEEP
6144:yIbvG8xKDIz0Ni3jMv4xkZBnKVs79RbKs7q:yIb7MG0Mj6j7TbKs2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1ffb5c5594760986132e958faa71d2db
Files
-
1ffb5c5594760986132e958faa71d2db.exe windows:4 windows x86 arch:x86
b4bdfa6341631f8375301452068185a3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
wsock32
WSAGetLastError
WSACleanup
ioctlsocket
WSAStartup
socket
connect
htons
psapi
GetModuleFileNameExA
EnumProcessModules
kernel32
GetCurrentDirectoryA
ReadFile
WriteFile
SetFilePointer
FlushFileBuffers
SetEndOfFile
GetCurrentProcess
GetFullPathNameA
CreateFileA
RtlUnwind
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
HeapFree
GetTimeZoneInformation
GetSystemTimeAsFileTime
GetDriveTypeA
GetStartupInfoA
GetCommandLineA
ExitProcess
HeapReAlloc
HeapSize
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
SetUnhandledExceptionFilter
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
SetStdHandle
SetEnvironmentVariableA
GetOEMCP
GetCPInfo
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
LoadLibraryA
FreeLibrary
lstrcatA
lstrcmpW
GetModuleHandleA
GetProcAddress
lstrcpyA
GlobalFlags
lstrcmpA
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
EnterCriticalSection
GlobalHandle
GlobalReAlloc
LeaveCriticalSection
GetModuleFileNameA
InterlockedIncrement
InterlockedDecrement
DeleteCriticalSection
InitializeCriticalSection
RaiseException
SetLastError
GlobalFree
FindResourceA
LoadResource
LockResource
SizeofResource
GlobalAlloc
GlobalLock
GlobalUnlock
lstrcpynA
OpenProcess
TerminateProcess
CreateToolhelp32Snapshot
Process32Next
GetCurrentProcessId
CloseHandle
LocalAlloc
DeleteFileA
Sleep
CreateProcessA
FormatMessageA
LocalFree
GetCurrentThreadId
GetLastError
MoveFileExA
lstrlenA
lstrcmpiA
WideCharToMultiByte
CompareStringA
CompareStringW
MultiByteToWideChar
GetVersion
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
GetVersionExA
HeapAlloc
user32
GetClassInfoExA
SetPropA
GetPropA
RemovePropA
GetForegroundWindow
GetTopWindow
GetMessageTime
GetMessagePos
MapWindowPoints
GetClientRect
GetMenu
AdjustWindowRectEx
GetClassInfoA
RegisterClassA
CallWindowProcA
SystemParametersInfoA
IsIconic
GetWindowPlacement
CopyRect
SetMenuItemBitmaps
ModifyMenuA
GetMenuCheckMarkDimensions
LoadBitmapA
SetWindowPos
SetWindowLongA
GetDlgItem
SetWindowsHookExA
CallNextHookEx
WinHelpA
PeekMessageA
ValidateRect
ClientToScreen
GetWindow
GetWindowRect
PtInRect
GetFocus
SetWindowTextA
GetClassNameA
GetWindowTextA
GetParent
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
EnableWindow
UnhookWindowsHookEx
GetSystemMetrics
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
UnregisterClassA
GetMenuState
GetMenuItemID
GetMenuItemCount
RegisterWindowMessageA
EnableMenuItem
CheckMenuItem
GetCursorPos
SetForegroundWindow
TrackPopupMenu
PostMessageA
LoadMenuA
GetSubMenu
DestroyMenu
SetMenuDefaultItem
LoadImageA
DestroyIcon
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
DestroyWindow
DefWindowProcA
BeginPaint
PostQuitMessage
CreateWindowExA
UpdateWindow
LoadIconA
LoadCursorA
RegisterClassExA
EnumWindows
MessageBoxA
GetMessageA
TranslateMessage
DispatchMessageA
LoadStringA
GetWindowThreadProcessId
SendMessageA
SetTimer
KillTimer
GetCapture
GetKeyState
GetClassLongA
GetDlgCtrlID
gdi32
DeleteDC
GetStockObject
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SaveDC
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
DeleteObject
GetDeviceCaps
SetMapMode
RestoreDC
SetViewportOrgEx
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
RegDeleteValueA
QueryServiceConfigA
RegDeleteKeyA
CloseServiceHandle
RegOpenKeyExA
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
QueryServiceStatus
OpenSCManagerA
OpenServiceA
shell32
SHGetMalloc
SHGetPathFromIDListA
SHGetSpecialFolderLocation
Shell_NotifyIconA
ShellExecuteExA
comctl32
ord17
ole32
CoCreateInstance
CoInitialize
oleaut32
VariantChangeType
VariantClear
VariantInit
oleacc
CreateStdAccessibleObject
LresultFromObject
Sections
.text Size: 104KB - Virtual size: 104KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 28KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 8KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 84KB - Virtual size: 84KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE