Static task
static1
Behavioral task
behavioral1
Sample
112a66a7a5183e1c063a4411c0b516c5.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
112a66a7a5183e1c063a4411c0b516c5.exe
Resource
win10v2004-20231215-en
General
-
Target
112a66a7a5183e1c063a4411c0b516c5
-
Size
616KB
-
MD5
112a66a7a5183e1c063a4411c0b516c5
-
SHA1
b44e8fac45ef365496857d7652fe133af497956a
-
SHA256
3b6d2bfd54f01b164c1cdae5ebc1c05f495c6f2fd6e5cb16bf43e570eab5903d
-
SHA512
0c8d997dff6624050f71b166983da28ba3fd357866e073922141e4d146212df1ee441b6effe6b9b594670b7aae874d4d0873fc83da0c1f2f7efc7c1f75918670
-
SSDEEP
12288:KccepbkKzHvhl57AZCUZRjPNGd6S1wm0PQP8tNVXG4S5V3:9cukCHDtAcEod6/QEtvhSf3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 112a66a7a5183e1c063a4411c0b516c5
Files
-
112a66a7a5183e1c063a4411c0b516c5.exe windows:4 windows x86 arch:x86
5a0bd1cacc1df0eead37941ff37f5d0e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
ImageList_GetIcon
ImageList_SetDragCursorImage
ImageList_LoadImageA
ImageList_Destroy
ImageList_GetDragImage
ImageList_AddMasked
InitCommonControlsEx
ImageList_GetBkColor
CreateStatusWindowA
ImageList_DragMove
ImageList_DragShowNolock
ImageList_SetIconSize
user32
MessageBoxW
CreateWindowExW
EmptyClipboard
DdeClientTransaction
OpenWindowStationW
RegisterClassExA
IsWindowVisible
RegisterClipboardFormatW
RealGetWindowClass
GetKeyboardState
SetPropA
DrawFrame
GetWindowContextHelpId
GetClassInfoExA
GetInputDesktop
CopyImage
RegisterDeviceNotificationA
DefWindowProcA
GetDlgItemInt
GetScrollRange
ToUnicode
EndDialog
UnhookWinEvent
ShowWindow
EndPaint
RegisterClassA
GetMenuBarInfo
GetScrollPos
DestroyWindow
AnimateWindow
kernel32
GlobalFree
GlobalGetAtomNameA
InitializeCriticalSection
GetOEMCP
GetThreadPriorityBoost
TlsSetValue
GetProcAddress
GetEnvironmentStringsW
GetCurrentProcessId
CloseHandle
GetLocaleInfoW
GetVersionExA
ReadFile
GetLastError
VirtualProtect
HeapReAlloc
DeleteCriticalSection
GetCPInfo
GetLocaleInfoA
UnhandledExceptionFilter
WaitForMultipleObjectsEx
ExitProcess
GetTickCount
WriteFile
HeapAlloc
FreeEnvironmentStringsA
QueryPerformanceCounter
GetStartupInfoA
GetCurrentProcess
GetStdHandle
SetLastError
FlushViewOfFile
HeapDestroy
VirtualQuery
SetLocaleInfoA
SetEnvironmentVariableA
IsValidLocale
GetCurrentThreadId
VirtualAlloc
InterlockedExchange
TerminateProcess
LeaveCriticalSection
VirtualFree
GetModuleHandleW
GetModuleHandleA
GetFileType
SetStdHandle
TlsFree
SetFilePointer
FreeEnvironmentStringsW
TlsGetValue
GetDateFormatA
IsBadWritePtr
FlushFileBuffers
EnumSystemLocalesA
GetCurrentThread
FreeResource
GetStringTypeA
HeapFree
MultiByteToWideChar
OpenMutexA
lstrcmp
GetCommandLineA
GetCurrencyFormatW
GetStringTypeW
SetVolumeLabelW
GetModuleFileNameA
GetEnvironmentStrings
RtlUnwind
GetUserDefaultLCID
GetTimeZoneInformation
SetHandleCount
GetSystemInfo
HeapSize
SetLocaleInfoW
LCMapStringA
HeapCreate
GetACP
CreateDirectoryA
EnterCriticalSection
IsValidCodePage
TlsAlloc
WideCharToMultiByte
CreateMutexA
GetTimeFormatA
CompareStringW
LCMapStringW
LoadLibraryA
GetSystemTimeAsFileTime
CompareStringA
Sections
.text Size: 180KB - Virtual size: 177KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 252KB - Virtual size: 249KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 112KB - Virtual size: 121KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 68KB - Virtual size: 66KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ