Static task
static1
Behavioral task
behavioral1
Sample
106c26b8fc51a9ae7667dd54704e20fd.exe
Resource
win7-20231215-en
General
-
Target
106c26b8fc51a9ae7667dd54704e20fd
-
Size
317KB
-
MD5
106c26b8fc51a9ae7667dd54704e20fd
-
SHA1
fdd2c3413a35832046892f20690dce8bfe863edc
-
SHA256
b341ba2b764038d47de60682db950dfb437461d255bc26179d30847490246078
-
SHA512
9c056809d3924e4719166b64840335f5b32b24f4b946bc50bb78342c354ff32785b067963ae652586dc8a082f4f4d1f3c5bc9a4e3250cb7ca80951d7232bd803
-
SSDEEP
6144:ydiSDSnxLbg94E4j1cbW49F4Zj1IP3yZiN3u6UH:Ugu4j6y49aZ2yDJ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 106c26b8fc51a9ae7667dd54704e20fd
Files
-
106c26b8fc51a9ae7667dd54704e20fd.exe windows:4 windows x86 arch:x86
a96c91b82901da80afa0c8d8aab585f9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalAddAtomW
GetCurrentProcessId
InterlockedIncrement
LocalAlloc
TlsGetValue
GlobalReAlloc
GlobalHandle
TlsAlloc
TlsSetValue
LocalReAlloc
DeleteCriticalSection
TlsFree
GetThreadLocale
FileTimeToSystemTime
WritePrivateProfileStringW
GetModuleHandleA
GlobalFlags
CompareStringW
GetVersionExA
GlobalFindAtomW
MoveFileW
InterlockedDecrement
ReadFile
WriteFile
SetFilePointer
FlushFileBuffers
SetEndOfFile
SetErrorMode
FileTimeToLocalFileTime
GetFileAttributesW
GetStartupInfoW
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetDriveTypeW
RtlUnwind
RaiseException
HeapReAlloc
ExitProcess
HeapSize
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringA
LCMapStringW
VirtualAlloc
GetCurrentDirectoryA
GetTimeZoneInformation
GetConsoleCP
GetConsoleMode
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetDriveTypeA
CreateFileA
SetEnvironmentVariableA
SetEnvironmentVariableW
GlobalDeleteAtom
ConvertDefaultLocale
GetVersion
EnumResourceLanguagesW
GetLocaleInfoW
CompareStringA
InterlockedExchange
lstrcmpW
lstrlenA
lstrcmpA
GlobalLock
GlobalUnlock
lstrlenW
LoadLibraryA
GlobalFree
GlobalAlloc
GetTickCount
GetSystemDefaultLangID
GetUserDefaultLangID
GetSystemDefaultUILanguage
GetUserDefaultUILanguage
LoadLibraryExW
CreateFileW
LocalFree
FormatMessageW
OutputDebugStringW
GetCurrentThreadId
GetCurrentThread
GetModuleHandleW
CloseHandle
GetExitCodeProcess
WaitForSingleObject
CreateProcessW
GetCurrentProcess
MultiByteToWideChar
WideCharToMultiByte
HeapFree
GetProcessHeap
HeapAlloc
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
GetLocalTime
SetLastError
FreeLibrary
CopyFileW
GetTempPathW
GetModuleFileNameW
GetWindowsDirectoryW
RemoveDirectoryW
FindClose
FindNextFileW
SetFileAttributesW
FindFirstFileW
GetFullPathNameW
FindResourceW
LoadResource
GetProcAddress
LockResource
LoadLibraryW
SizeofResource
Sleep
GetLastError
DeleteFileW
user32
GetForegroundWindow
GetDlgItem
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
GetClientRect
GetMenu
CreateWindowExW
UnregisterClassA
GetClassInfoW
RegisterClassW
AdjustWindowRectEx
CopyRect
DefWindowProcW
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindow
GetDlgCtrlID
GetClassNameW
PtInRect
SetWindowTextW
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
ClientToScreen
GetWindowTextW
LoadCursorW
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
GetWindowThreadProcessId
GetWindowLongW
GetLastActivePopup
IsWindowEnabled
EnableWindow
SetCursor
TranslateMessage
DispatchMessageW
GetActiveWindow
IsWindowVisible
GetKeyState
PeekMessageW
GetCursorPos
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapW
GetFocus
GetParent
SendMessageW
ModifyMenuW
EnableMenuItem
CheckMenuItem
PostQuitMessage
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
LoadStringW
UnhookWindowsHookEx
MessageBoxW
SetWindowsHookExW
CallNextHookEx
SetWindowLongW
SetWindowPos
GetWindowRect
GetSystemMetrics
CallWindowProcW
ExitWindowsEx
PostMessageW
DestroyMenu
UnregisterClassW
ShowWindow
RegisterWindowMessageW
LoadIconW
WinHelpW
GetMessageW
GetClassLongW
SetPropW
GetPropW
RemovePropW
GetCapture
IsWindow
GetClassInfoExW
gdi32
SetBkColor
RestoreDC
SaveDC
CreateBitmap
PtVisible
GetDeviceCaps
RectVisible
TextOutW
ExtTextOutW
Escape
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
GetStockObject
DeleteObject
GetClipBox
SetMapMode
SetTextColor
winspool.drv
OpenPrinterW
ClosePrinter
DocumentPropertiesW
advapi32
RegCloseKey
RegQueryValueExW
RegDeleteValueW
RegQueryValueW
RegEnumKeyW
RegDeleteKeyW
RegOpenKeyW
RegOpenKeyExW
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
RegSetValueExW
RegCreateKeyExW
shell32
ord680
SHGetFolderPathW
shlwapi
PathAppendW
PathFindExtensionW
PathFindFileNameW
oleaut32
VariantChangeType
VariantClear
VariantInit
Sections
.text Size: 168KB - Virtual size: 167KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 40KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 12KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 88KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE