Static task
static1
Behavioral task
behavioral1
Sample
10dc2d2523f240cf314c299fcc3f9458.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
10dc2d2523f240cf314c299fcc3f9458.exe
Resource
win10v2004-20231215-en
General
-
Target
10dc2d2523f240cf314c299fcc3f9458
-
Size
521KB
-
MD5
10dc2d2523f240cf314c299fcc3f9458
-
SHA1
29f06099d7df01383c87488f4d0fba150a736643
-
SHA256
1ea357b57bddd23c65d700b6dd10d3a5c5375dd550140f57eb634232a6c56b0a
-
SHA512
8977fd2dae58e16f5f9c541f7141ccacda1b0eabb3e5254a1cccdcddc8552af2a3acbee3a06036579d5e35cdead4a06607b2173fe21950f5b6f5d0d8d0721641
-
SSDEEP
12288:LZMEwnh9ixZSvleMwniE1YE90asMlfXLhTpgCH:lMXh96MwMwniE1VZfXLhTpb
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 10dc2d2523f240cf314c299fcc3f9458
Files
-
10dc2d2523f240cf314c299fcc3f9458.exe windows:4 windows x86 arch:x86
1c5632d10cf76f02a26d174abf295589
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetPriorityClass
SetEnvironmentVariableA
IsBadWritePtr
QueryPerformanceCounter
GetVersionExW
HeapSize
IsValidCodePage
GetSystemInfo
LoadResource
SetFilePointer
SetConsoleCursorPosition
EnumSystemLocalesA
OpenMutexA
HeapFree
LeaveCriticalSection
VirtualQuery
SetStdHandle
GetEnvironmentStrings
GetACP
GetCurrentProcessId
GetTimeZoneInformation
GetTickCount
GetOEMCP
GetCurrentThreadId
VirtualFree
GetStartupInfoA
TlsAlloc
ReadFile
EnterCriticalSection
GetPrivateProfileStructA
WriteFile
GetTimeFormatA
FlushFileBuffers
GetLastError
WaitNamedPipeA
GetLocaleInfoA
SetHandleCount
GetSystemTimeAsFileTime
GetCPInfo
VirtualProtect
SetLastError
SetConsoleScreenBufferSize
FindAtomA
GetCurrentThread
GetModuleFileNameW
VirtualAlloc
GetStringTypeW
InitializeCriticalSection
GetDateFormatA
GetCommandLineA
GetLocaleInfoW
ReadConsoleInputA
GetStdHandle
FreeEnvironmentStringsW
IsValidLocale
GetStartupInfoW
TlsFree
LCMapStringA
GetProcAddress
CompareStringA
GetStringTypeA
GetModuleHandleA
GetFileType
WriteConsoleOutputCharacterW
CreateProcessA
SetThreadLocale
HeapCreate
HeapReAlloc
GetPrivateProfileSectionW
LCMapStringW
GetCurrentProcess
RtlUnwind
WriteConsoleInputA
GetUserDefaultLCID
CloseHandle
ExitProcess
HeapDestroy
CreateMailslotW
TryEnterCriticalSection
WideCharToMultiByte
HeapAlloc
FreeEnvironmentStringsA
TerminateProcess
TlsGetValue
MultiByteToWideChar
GetEnvironmentStringsW
LoadLibraryA
InterlockedExchange
CompareStringW
UnhandledExceptionFilter
SetThreadContext
CreateMutexA
GetCommandLineW
GetModuleFileNameA
GetVersionExA
DeleteCriticalSection
TlsSetValue
user32
RegisterClassA
GetMenuItemCount
GetMessageTime
LoadImageW
RegisterClassExA
RealChildWindowFromPoint
UnpackDDElParam
gdi32
FlattenPath
GetMetaFileW
AbortPath
DeleteObject
SetTextJustification
CreateRectRgnIndirect
GetEnhMetaFileW
FrameRgn
SetBkColor
GetRandomRgn
gdiPlaySpoolStream
SetColorAdjustment
PolyBezierTo
SetBitmapBits
SetBrushOrgEx
TranslateCharsetInfo
advapi32
RegQueryInfoKeyA
LogonUserW
CryptSignHashW
RegRestoreKeyW
CryptDeriveKey
RegOpenKeyW
RegReplaceKeyW
RegQueryValueA
RegCreateKeyA
LookupPrivilegeDisplayNameW
CryptSetProviderA
RegNotifyChangeKeyValue
GetUserNameA
LookupPrivilegeValueW
CryptDestroyHash
comctl32
ImageList_GetDragImage
ImageList_DragMove
InitCommonControlsEx
Sections
.text Size: 168KB - Virtual size: 167KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 211KB - Virtual size: 239KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 104KB - Virtual size: 104KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ