Static task
static1
Behavioral task
behavioral1
Sample
124c68363f157202e34719664b9afdb8.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
124c68363f157202e34719664b9afdb8.exe
Resource
win10v2004-20231215-en
General
-
Target
124c68363f157202e34719664b9afdb8
-
Size
161KB
-
MD5
124c68363f157202e34719664b9afdb8
-
SHA1
110d60aac21e89813ea70f722250ce9e5e984ea0
-
SHA256
cc254d224437e1cad83771942ceffa9aa59ac9cac03c594a02588ee00c15159e
-
SHA512
82aa3bb26e97cb85b05606179cf5e2ece9b91ce140acbbe3f1e1fbec910981bdc571c7c7ac4a4fd65c777cead9f156ac3b9b8563bb485deb7d2bf48f7976590b
-
SSDEEP
3072:SWILTFjKOHelsZJYUsH+qV44HZNtgv8GIbvgTrlXIDUIS1w+BpTG/DH+DSAgMv4:tu5e2364Ur9vgTBXIAIGxRGSDSr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 124c68363f157202e34719664b9afdb8
Files
-
124c68363f157202e34719664b9afdb8.exe windows:4 windows x86 arch:x86
89aa21291862a6491da93eab6ecd7fdd
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
MultiByteToWideChar
LoadLibraryA
GetProcAddress
IsBadWritePtr
HeapReAlloc
VirtualAlloc
HeapAlloc
GetOEMCP
GetACP
GetCPInfo
FatalAppExitA
LCMapStringA
EnterCriticalSection
InitializeCriticalSection
RtlUnwind
HeapFree
VirtualFree
HeapCreate
HeapDestroy
GetCurrentThread
GetLastError
TlsGetValue
SetLastError
LCMapStringW
GetStringTypeA
GetModuleHandleW
GetCommandLineW
GetVersion
WriteFile
SetFilePointer
CloseHandle
ExitProcess
LocalAlloc
LocalFree
LeaveCriticalSection
Sleep
TlsFree
TlsAlloc
TlsSetValue
GetCurrentThreadId
GetStringTypeW
DeleteCriticalSection
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
user32
GetDlgCtrlID
FrameRect
GetDoubleClickTime
SetParent
SetCursor
WindowFromPoint
DispatchMessageW
TranslateMessage
GetMessageW
LoadIconA
IsClipboardFormatAvailable
GetClipboardData
CopyAcceleratorTableW
SetMenuItemInfoA
GetMenuItemInfoA
GetMessageTime
SetScrollInfo
ScrollWindow
GetTopWindow
GetSysColor
DrawTextW
CreateWindowExW
LockWindowUpdate
DrawIcon
SetForegroundWindow
advapi32
RegOpenKeyExW
RegQueryValueExW
RegSetValueExW
SetServiceStatus
AdjustTokenPrivileges
LookupPrivilegeValueW
CloseServiceHandle
ControlService
RegDeleteKeyW
RegOpenKeyW
SetSecurityDescriptorGroup
SetSecurityDescriptorOwner
RegCloseKey
ws2_32
getsockname
htons
shutdown
setsockopt
getpeername
gethostname
gethostbyname
send
WSACleanup
socket
WSAStartup
sendto
Sections
.text Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 26KB - Virtual size: 86KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 72KB - Virtual size: 91KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE