Static task
static1
Behavioral task
behavioral1
Sample
109c1d0bf6b0478d1415d09097c9015a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
109c1d0bf6b0478d1415d09097c9015a.exe
Resource
win10v2004-20231215-en
General
-
Target
109c1d0bf6b0478d1415d09097c9015a
-
Size
454KB
-
MD5
109c1d0bf6b0478d1415d09097c9015a
-
SHA1
21db57514c90ef9482ce395428654a66af3a24cd
-
SHA256
a04a0ab60a4dab222f982a8480f74527d850a18b6abc9fb39e780844b567b370
-
SHA512
3e336447624a0410f0030188589cd8caa237a312f444bda59670a023eeeadd7a7f94fc70b470b9dd55571216622ae566b8f893fd4d12dfae263c9d95f225eb96
-
SSDEEP
12288:qzGQCTsbErfhJ6svzaN3NPQC5NBIiQ11gGeuozpNso3IMMnMMMMM:qzze+EbhJrzaNeIBuUuo1T4MMnMMMMM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 109c1d0bf6b0478d1415d09097c9015a
Files
-
109c1d0bf6b0478d1415d09097c9015a.exe windows:4 windows x86 arch:x86
8e8f03131db3d7f5a96c124c43fcbca1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetWindowLongA
SetWindowLongA
LoadCursorA
SendDlgItemMessageA
DialogBoxParamA
SetDlgItemTextA
SendMessageW
LoadImageA
ReleaseDC
SetCursor
DialogBoxParamW
EndDialog
MessageBeep
SendMessageA
GetDlgItem
DialogBoxIndirectParamW
GetWindowRect
SetFocus
LoadStringA
LoadBitmapA
GetParent
GetDlgItemTextA
CallMsgFilterA
CreateWindowExW
EnableWindow
WinHelpA
GetSysColor
DialogBoxIndirectParamA
ShowWindow
msi
MsiDatabaseExportW
shell32
ShellExecuteA
gdi32
GetTextMetricsW
GetTextExtentPointW
GetTextMetricsA
SelectObject
GetTextExtentPointA
DeleteObject
cfgmgr32
CM_Get_Child
CM_Get_Class_NameA
shlwapi
StrCatBuffW
kernel32
lstrlenA
SetProcessWorkingSetSize
GetLastError
GetTickCount
ExitProcess
GetCurrentThreadId
CompareFileTime
lstrlenW
InterlockedCompareExchange
EnterCriticalSection
FileTimeToSystemTime
WinExec
VirtualAlloc
HeapAlloc
HeapFree
LeaveCriticalSection
GetDateFormatA
DeleteCriticalSection
GetSystemTimeAsFileTime
GetCommandLineA
QueryPerformanceCounter
InitializeCriticalSection
HeapReAlloc
GetProcAddress
UnhandledExceptionFilter
GetCurrentProcess
GetCurrentProcessId
TerminateProcess
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 183KB - Virtual size: 1.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 119KB - Virtual size: 119KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 142KB - Virtual size: 142KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ