Static task
static1
Behavioral task
behavioral1
Sample
109389b0cf411b72133fceb255bdab0f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
109389b0cf411b72133fceb255bdab0f.exe
Resource
win10v2004-20231215-en
General
-
Target
109389b0cf411b72133fceb255bdab0f
-
Size
990KB
-
MD5
109389b0cf411b72133fceb255bdab0f
-
SHA1
fb83374f52153c98b7ea829980e59bd9dfc7a8ac
-
SHA256
bdb74bb539a40ab09d5d9eced0167a8dc3b787c4c9549fc7098d1a882e90b16c
-
SHA512
851e138768f7f8d27fd750575227d22393d9569a93283248522a4a1401b4fa93e249779ed44fbb16e6462da39b7811cab62fc6bcf6f8175ebaabb85e590ad604
-
SSDEEP
24576:JShxTYKEFpij6PtKjM7PlN3sZlnSKcSDSyf1yy9B/UA6yyS:JZKWQ+PsM79NGkKc0StPA6y
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 109389b0cf411b72133fceb255bdab0f
Files
-
109389b0cf411b72133fceb255bdab0f.exe windows:4 windows x86 arch:x86
4fd66a978541b833b8ecb154628e0ba0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
user32
MoveWindow
gdi32
ScaleWindowExtEx
comdlg32
GetFileTitleW
winspool.drv
OpenPrinterW
advapi32
GetSecurityDescriptorControl
shell32
DragQueryFileW
comctl32
InitCommonControlsEx
shlwapi
PathFindFileNameW
oledlg
OleUIAddVerbMenuW
ole32
CoFreeUnusedLibraries
oleaut32
LoadTypeLi
ws2_32
WSAGetLastError
wldap32
ord26
gdiplus
GdipDrawImageRectI
dbghelp
ImageDirectoryEntryToData
version
GetFileVersionInfoW
wininet
InternetConnectW
winmm
PlaySoundW
Sections
.text Size: 872KB - Virtual size: 2.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
SharedSe Size: - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 50KB - Virtual size: 229KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 65KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE