Static task
static1
Behavioral task
behavioral1
Sample
090de432318e4f209367742f4b86a5dd.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
090de432318e4f209367742f4b86a5dd.exe
Resource
win10v2004-20231215-en
General
-
Target
090de432318e4f209367742f4b86a5dd
-
Size
604KB
-
MD5
090de432318e4f209367742f4b86a5dd
-
SHA1
d29aa44472c7df6e4595648f9cdfb12af6323ec4
-
SHA256
5e7dd04c93df88753d5ddf9c7fddf1a566d2bbdd971d038d182290ca6b024b7c
-
SHA512
22149fba3978fc6c1a80f6586de2aedd7c2c77c30616851354c5efd0acee58daf7a8c4e455099f266e3b4e2c209c6627700f1ac9cd5e6ce8d859e6d76f2a59d6
-
SSDEEP
12288:3RzrTH89AN403R+FyFzBnRa9juI2wL3hzHNGtgcglvz:3RzE9S4pFyFzDWjRLxtGtgcgx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 090de432318e4f209367742f4b86a5dd
Files
-
090de432318e4f209367742f4b86a5dd.exe windows:4 windows x86 arch:x86
4b4fddb88d797c6d32cf6a7b781c89bf
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
DestroyWindow
ShowWindowAsync
CreateWindowExA
ShowWindow
RegisterClassExA
DlgDirListA
SendMessageA
DestroyMenu
IsWindow
ToAscii
SendNotifyMessageA
DefWindowProcW
RegisterClassA
DdeAddData
DrawCaption
EndPaint
CharLowerW
ActivateKeyboardLayout
EnumDisplayMonitors
DdeCreateDataHandle
CreateDialogParamW
CharNextExA
MessageBoxW
comctl32
InitCommonControlsEx
ImageList_DrawIndirect
ImageList_Replace
ImageList_GetImageCount
GetEffectiveClientRect
ImageList_GetBkColor
comdlg32
ChooseColorA
PrintDlgA
FindTextA
kernel32
CloseHandle
GetModuleHandleA
WriteConsoleOutputCharacterA
GetEnvironmentVariableA
EnumCalendarInfoExA
SetHandleCount
GetStringTypeW
GetFileType
SetStdHandle
GetTickCount
GetUserDefaultLangID
GetCurrentThread
SetEnvironmentVariableA
GetCPInfo
CompareStringA
IsBadReadPtr
GlobalHandle
GetOEMCP
GetStdHandle
ExpandEnvironmentStringsW
UnlockFileEx
ReadFile
DebugBreak
TlsGetValue
MultiByteToWideChar
CreateMutexA
IsValidCodePage
OutputDebugStringA
GetEnvironmentStrings
GlobalFindAtomW
InitializeCriticalSection
SetConsoleCtrlHandler
GetCommandLineA
SetConsoleScreenBufferSize
GetCurrentDirectoryA
InterlockedIncrement
FlushConsoleInputBuffer
EnumDateFormatsExW
UnmapViewOfFile
RtlUnwind
TlsSetValue
lstrcmpiA
GetLastError
lstrcpy
FindResourceW
GetDateFormatA
CreateThread
MoveFileA
GetLocaleInfoW
CreateMutexW
WriteFile
IsBadWritePtr
TlsFree
SetLastError
FreeEnvironmentStringsA
OpenSemaphoreA
SetConsoleOutputCP
ConnectNamedPipe
HeapAlloc
VirtualProtect
GetNamedPipeHandleStateW
FindResourceExW
GetLongPathNameA
GetLogicalDriveStringsA
GetCurrentProcess
HeapFree
IsValidLocale
GetACP
CreateFileMappingA
GetLocaleInfoA
MoveFileExA
FlushFileBuffers
GetConsoleCursorInfo
FoldStringA
LoadLibraryA
GetCurrentProcessId
SystemTimeToTzSpecificLocalTime
LocalLock
LCMapStringA
SetThreadIdealProcessor
HeapDestroy
HeapReAlloc
GetSystemTimeAsFileTime
ExitProcess
GlobalSize
LCMapStringW
HeapValidate
CommConfigDialogW
GetStartupInfoA
FreeEnvironmentStringsW
TerminateProcess
GetPrivateProfileSectionW
OpenMutexW
GetEnvironmentStringsW
CompareStringW
GetModuleFileNameA
QueryPerformanceCounter
GetTimeFormatA
GetCurrentThreadId
GetStringTypeA
DeleteCriticalSection
HeapCreate
OpenMutexA
WriteProfileStringW
LocalSize
GlobalAddAtomW
WideCharToMultiByte
WritePrivateProfileStructA
UnhandledExceptionFilter
LeaveCriticalSection
VirtualFree
InterlockedDecrement
GetProcAddress
SetFilePointer
GetVersionExA
GetTimeZoneInformation
InterlockedExchange
ReadConsoleOutputCharacterW
TlsAlloc
GetWindowsDirectoryW
SetSystemTime
VirtualAlloc
EnumSystemLocalesA
EnterCriticalSection
VirtualQuery
GetUserDefaultLCID
WaitCommEvent
GetSystemInfo
Sections
.text Size: 204KB - Virtual size: 202KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 264KB - Virtual size: 263KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 108KB - Virtual size: 135KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ