Static task
static1
Behavioral task
behavioral1
Sample
125e618bbc31c5d6979bda656d5a6966.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
125e618bbc31c5d6979bda656d5a6966.exe
Resource
win10v2004-20231215-en
General
-
Target
125e618bbc31c5d6979bda656d5a6966
-
Size
724KB
-
MD5
125e618bbc31c5d6979bda656d5a6966
-
SHA1
38961919c853710b6b3672f82bbfa485b10bc9ea
-
SHA256
97ff030ec55778a5d0da19502d2faa3ebec189437cd3ba9baf59706605c03dfd
-
SHA512
22b3482eb7705d359a4018ad8a28c9fb9f890dc795c7f3cd3a18cec40013d0e534e23de68a110323be51b72258e69f2831f89060b24f7ec97781b76b0100d01f
-
SSDEEP
12288:Whim8fALxrREIKuNIYWIJAwttnSRJEmrlBHcjIUUTbxrZSjbUy/NUuQW:WhimG8VEKNPWIzUJzLcjEsB5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 125e618bbc31c5d6979bda656d5a6966
Files
-
125e618bbc31c5d6979bda656d5a6966.exe windows:4 windows x86 arch:x86
51d25e33cc8cbe6d10792a1c6d21be8f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
ImageList_Replace
DestroyPropertySheetPage
ImageList_SetImageCount
InitCommonControlsEx
CreateStatusWindowW
ImageList_SetFlags
kernel32
IsValidLocale
RtlUnwind
RaiseException
FindAtomW
GetWindowsDirectoryW
GetModuleFileNameW
SetCriticalSectionSpinCount
HeapAlloc
CreateNamedPipeA
GetTempPathA
SetTimeZoneInformation
GetModuleHandleA
EnterCriticalSection
WriteConsoleA
GetUserDefaultLCID
GetProcAddress
GlobalUnfix
FlushFileBuffers
GetTickCount
EnumCalendarInfoW
VirtualAlloc
LCMapStringW
WriteProfileSectionA
WriteFile
GetStringTypeW
DebugActiveProcess
TlsAlloc
GetStartupInfoW
GetCurrencyFormatW
GetProcessShutdownParameters
FindFirstFileExW
GetStringTypeA
GetOEMCP
IsValidCodePage
DebugBreak
GetComputerNameW
EnumSystemLocalesA
OpenEventW
UnhandledExceptionFilter
CreateFileA
GetLocaleInfoW
FreeLibrary
FormatMessageA
CreateWaitableTimerW
GetThreadTimes
TlsFree
CloseHandle
SetConsoleCursorPosition
VirtualLock
PulseEvent
LoadLibraryA
WriteProfileStringW
GetConsoleCP
HeapValidate
GetNumberFormatW
VirtualFree
ReadConsoleOutputAttribute
GetCommandLineA
lstrlenA
DeleteFileW
InterlockedIncrement
InterlockedDecrement
HeapReAlloc
OpenMutexA
SetFilePointer
LoadLibraryW
GetPrivateProfileStructA
SetLastError
QueryPerformanceCounter
HeapFree
GetExitCodeProcess
lstrcmpiW
GetACP
GetProfileIntW
TlsGetValue
WriteConsoleOutputCharacterA
GetTimeZoneInformation
CompareStringA
SetEnvironmentVariableA
SetConsoleCtrlHandler
WriteConsoleW
CreateFileMappingW
GetTimeFormatA
CompareStringW
SetStdHandle
VirtualQuery
FindNextFileA
FreeEnvironmentStringsW
IsBadWritePtr
GlobalAlloc
VirtualProtectEx
LeaveCriticalSection
WriteConsoleInputW
CreateWaitableTimerA
GetCurrentProcess
GetDateFormatA
WideCharToMultiByte
WriteConsoleInputA
WaitForMultipleObjectsEx
GetEnvironmentStrings
DeleteCriticalSection
GetStartupInfoA
GetDiskFreeSpaceA
GetPriorityClass
GetProcessHeap
GetCurrentThread
ConnectNamedPipe
HeapCreate
EnumTimeFormatsA
ReadFile
HeapDestroy
InterlockedExchange
OutputDebugStringW
FreeEnvironmentStringsA
GetLastError
TerminateProcess
OutputDebugStringA
LockFileEx
LCMapStringA
GetCPInfo
GetConsoleOutputCP
GetVersionExA
GetShortPathNameA
GlobalGetAtomNameA
CreateMutexA
GetCalendarInfoA
TlsSetValue
UnlockFileEx
GetProcAddress
IsBadReadPtr
EnumDateFormatsA
GetStdHandle
GetModuleFileNameA
IsDebuggerPresent
GetCommandLineW
MultiByteToWideChar
SleepEx
GetConsoleMode
SetUnhandledExceptionFilter
GetCurrentThreadId
GetSystemTimeAsFileTime
ExitProcess
EnumResourceLanguagesW
GlobalGetAtomNameW
GetCurrentProcessId
GetEnvironmentStringsW
CreateSemaphoreW
GetFileType
GetLocaleInfoA
GetPrivateProfileSectionW
GetDateFormatW
SetHandleCount
GetEnvironmentStringsA
InitializeCriticalSection
ReadConsoleInputW
EnumCalendarInfoA
gdi32
PolyBezierTo
PlgBlt
SetAbortProc
GetCharacterPlacementA
CopyEnhMetaFileA
OffsetWindowOrgEx
SetMetaRgn
GetDeviceCaps
GetTextExtentPointA
DeviceCapabilitiesExW
FillPath
CreateDCA
SetRectRgn
GetColorAdjustment
GetObjectW
CreateMetaFileW
Pie
SetMiterLimit
GetEnhMetaFileA
DeleteDC
GetCharWidthW
StartPage
GetTextExtentExPointA
GetMetaFileA
RectVisible
user32
TranslateMessage
DispatchMessageA
CreateAcceleratorTableA
ToUnicode
SendMessageA
OffsetRect
SetDoubleClickTime
GetCursor
DestroyWindow
EnumChildWindows
SetProcessDefaultLayout
FindWindowExW
SetWindowsHookExA
ShowWindow
OpenDesktopA
DrawMenuBar
DdeUnaccessData
IsCharUpperA
ToAscii
NotifyWinEvent
SendInput
SetFocus
VkKeyScanExW
DdeCreateDataHandle
FindWindowA
GetMessageExtraInfo
LoadCursorW
GetUserObjectInformationA
SetCursorPos
EnumPropsExA
CallMsgFilterA
CloseWindowStation
DlgDirListComboBoxA
FindWindowW
PtInRect
GetSysColorBrush
MenuItemFromPoint
SendMessageTimeoutA
LoadIconA
CreateWindowExA
AnyPopup
ChangeClipboardChain
LoadStringA
TabbedTextOutW
GetMonitorInfoW
DefWindowProcW
MessageBoxExW
OemToCharW
ChildWindowFromPointEx
HideCaret
MessageBoxIndirectW
DispatchMessageW
TranslateAcceleratorW
IsDialogMessageW
DefDlgProcA
GetClassInfoExW
CascadeChildWindows
DrawEdge
MessageBoxW
EndTask
RegisterClassExA
CreateMDIWindowA
GetKeyboardLayoutNameA
MapVirtualKeyW
RegisterClassA
SetClassLongW
GetWindowRgn
WINNLSEnableIME
DestroyCaret
GetProcessDefaultLayout
GetDlgItemTextA
InSendMessage
Sections
.text Size: 300KB - Virtual size: 298KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 284KB - Virtual size: 280KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 116KB - Virtual size: 144KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ