Static task
static1
Behavioral task
behavioral1
Sample
130adb32b5e23b38d826652272ee1ac1.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
130adb32b5e23b38d826652272ee1ac1.exe
Resource
win10v2004-20231215-en
General
-
Target
130adb32b5e23b38d826652272ee1ac1
-
Size
128KB
-
MD5
130adb32b5e23b38d826652272ee1ac1
-
SHA1
336ddb480873651a9dd3facccc89f7ac32d5db2b
-
SHA256
e40a7008a4b53e0020cfb623caa34234fb95d4d0592b3c93af36f9f676159c05
-
SHA512
74662d9cb88763b6a118dee6ad874327270e1604aa3d101288ebd71086961104f7fcf800b711b9c73ace19ba63f469324466b61b6cb2f87b5b92b4080e52471b
-
SSDEEP
3072:x1Ad3Vat4NyEbq+C/pFZFLW46QXMmAITS7akgdKEu:x14CEbf4p3dW4HMK7Pd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 130adb32b5e23b38d826652272ee1ac1
Files
-
130adb32b5e23b38d826652272ee1ac1.exe windows:4 windows x86 arch:x86
3eb3c609817563ecdb545ae23599e157
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
iphlpapi
GetAdaptersInfo
mfc71
ord1522
ord6279
ord3802
ord6277
ord3345
ord4967
ord1362
ord5175
ord1964
ord1656
ord1655
ord1599
ord5200
ord2862
ord4486
ord4262
ord516
ord718
ord4736
ord2164
ord2657
ord3928
ord4580
ord762
ord1793
ord3514
ord1486
ord876
ord784
ord4108
ord578
ord781
ord3997
ord5529
ord310
ord4035
ord304
ord3645
ord3450
ord6231
ord1001
ord6043
ord2321
ord3934
ord297
ord1489
ord2902
ord299
ord2933
ord6118
ord1191
ord1187
ord6286
ord1211
ord2306
ord1181
ord2259
ord4566
ord2614
ord2621
ord6238
ord2016
ord2051
ord5156
ord5592
ord1379
ord5412
ord2742
ord5495
ord4852
ord1922
ord4222
ord3040
ord2768
ord5934
ord4482
ord4264
ord616
ord444
ord368
ord677
ord5480
ord4257
ord744
ord1452
ord6295
ord555
ord908
ord907
ord5458
ord1123
ord1544
ord5403
ord2468
ord4705
ord4739
ord721
ord2036
ord980
ord524
ord5320
ord1159
ord826
ord833
ord3641
ord4469
ord4467
ord3683
ord4038
ord4014
ord6278
ord3801
ord6276
ord4326
ord2063
ord2018
ord5583
ord3806
ord1010
ord5102
ord6219
ord5382
ord3832
ord1920
ord2931
ord5224
ord5226
ord2248
ord3948
ord5230
ord5213
ord5566
ord4261
ord3333
ord566
ord757
ord4212
ord4735
ord5203
ord4722
ord3182
ord354
ord605
ord4568
ord2451
ord1083
ord6090
ord593
ord5225
ord5119
ord334
ord5386
ord2156
ord959
ord4081
ord4031
ord2172
ord3652
ord3490
ord5167
ord4100
ord2094
ord3244
ord1955
ord2371
ord1283
ord1063
ord2093
ord4444
ord4443
ord4790
ord4204
ord4781
ord4172
ord4181
ord4591
ord4777
ord4386
ord4401
ord4399
ord4381
ord4384
ord4379
ord4864
ord4861
ord3974
ord5915
ord1402
ord4239
ord5151
ord5214
ord1207
ord1361
ord4273
ord340
ord596
ord651
ord416
ord4104
ord6144
ord3795
ord2882
ord2370
ord1565
ord3875
ord3419
ord5665
ord5365
ord1494
ord4248
ord4289
ord4745
ord4866
ord4813
ord5649
ord5362
ord1436
ord925
ord322
ord586
ord1275
ord3648
ord3466
ord2246
ord1913
ord2615
ord5009
ord5012
ord4309
ord4135
ord2939
ord4904
ord943
ord5356
ord2992
ord2425
ord2424
ord4019
ord1557
ord3945
ord5148
ord5205
ord2173
ord1306
ord4277
ord4265
ord635
ord553
ord395
ord742
ord5165
ord1263
ord5154
ord1903
ord4342
ord5929
ord5859
ord4299
ord5833
ord1788
ord1881
ord1873
ord1892
ord4166
ord328
ord588
ord6002
ord558
ord746
ord6174
ord2131
ord1185
ord870
ord5440
ord1250
ord1482
ord2322
ord2271
ord4085
ord3873
ord1005
ord4109
ord2272
ord6180
ord265
ord3023
ord1024
ord378
ord3089
ord4067
ord664
ord427
ord5895
ord5807
ord865
ord911
ord5235
ord5233
ord2390
ord2400
ord2398
ord2396
ord2392
ord2415
ord2403
ord783
ord2178
ord912
ord2405
ord2387
ord2385
ord2408
ord2413
ord2394
ord2410
ord934
ord930
ord932
ord928
ord923
ord5960
ord1600
ord4282
ord4720
ord3403
ord5211
ord4185
ord6275
ord5073
ord1908
ord5152
ord4244
ord1401
ord3946
ord1617
ord1620
ord5912
ord1551
ord1670
ord1671
ord2020
ord4890
ord4213
ord5182
ord4190
ord4844
ord4867
ord4617
ord4797
ord5070
ord5072
ord5071
ord3552
ord3667
ord1122
ord764
ord2176
ord1308
ord1091
ord1084
ord735
ord547
ord3311
ord4263
ord4481
ord3949
ord2644
ord3709
ord3719
ord3718
ord2533
ord2646
ord2540
ord2838
ord2714
ord4307
ord2835
ord2731
ord2537
ord4039
ord2764
ord3031
ord962
ord5455
ord2672
ord4093
ord1686
ord1687
ord3827
ord5582
ord1458
ord5798
ord4565
ord3635
ord5974
ord3344
msvcr71
_controlfp
__security_error_handler
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_amsg_exit
_acmdln
exit
_cexit
_ismbblead
_XcptFilter
_exit
_c_exit
malloc
_setmbcp
__CxxFrameHandler
free
strftime
_localtime64
_time64
_vsnprintf
_mbctype
atoi
_mktime64
memmove
__dllonexit
_except_handler3
_mbsnbcat
memset
_onexit
kernel32
FindNextFileA
SetFilePointer
CreateFileA
GetFileSize
GetFileTime
GetSystemTime
lstrcmpA
GetFullPathNameA
ReadFile
GetExitCodeThread
ResumeThread
FileTimeToLocalFileTime
FileTimeToSystemTime
lstrcpynA
WaitForSingleObject
TerminateThread
Sleep
CreateEventA
CreateThread
SetEvent
WaitForMultipleObjects
ResetEvent
CreateDirectoryA
GetComputerNameA
GetCurrentDirectoryA
UnmapViewOfFile
FindFirstFileA
OpenFileMappingA
GetLastError
MapViewOfFile
GetFileAttributesA
GetVersionExA
GetCurrentProcess
GetCurrentThreadId
SetLastError
CreateMutexA
InitializeCriticalSection
DeleteCriticalSection
GetModuleHandleA
GetStartupInfoA
ExitProcess
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
WriteFile
CreatePipe
CreateProcessA
FlushFileBuffers
GetTempFileNameA
GetTempPathA
CloseHandle
GetEnvironmentVariableA
user32
wsprintfA
LoadIconA
GetUserObjectInformationA
PostMessageA
GetCursorPos
GetWindowLongA
SetWindowLongA
SendMessageA
GetThreadDesktop
KillTimer
ScreenToClient
LoadMenuA
GetSubMenu
MessageBoxA
EnableWindow
advapi32
RegCreateKeyExA
RegFlushKey
OpenProcessToken
GetTokenInformation
GetUserNameA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegSetValueA
shell32
ShellExecuteA
DragAcceptFiles
Shell_NotifyIconA
ws2_32
WSAStartup
shutdown
gethostname
listen
WSAGetLastError
Sections
.text Size: 48KB - Virtual size: 45KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 348B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 52KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ