Static task
static1
Behavioral task
behavioral1
Sample
12a013786d923334ff74ffdc1a81e3ad.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
12a013786d923334ff74ffdc1a81e3ad.exe
Resource
win10v2004-20231215-en
General
-
Target
12a013786d923334ff74ffdc1a81e3ad
-
Size
695KB
-
MD5
12a013786d923334ff74ffdc1a81e3ad
-
SHA1
59de1de91469c30e234a64349453476b2b72d890
-
SHA256
d478768341fc617508ca73fa2e22eadc475d1f5884ff45f9f8f44f48d28cd2fc
-
SHA512
9cd3d083a30dbdc1d3449b54f7e1f8ff7cd2773b51f97ce8987fe8db66e6268030e07aad542f57971806c8c2de1d90ea87987bc37e73ae96cafeb0a0f89a6946
-
SSDEEP
12288:AGBPLPzht+Q/+WDJmnLb2+o8ZNsXOWX0yrsRnQz8Qfr+ZWid5aXUelQ9:AU7zht+Q/+smnLb2+o8ZNsZcNsyaEn
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 12a013786d923334ff74ffdc1a81e3ad
Files
-
12a013786d923334ff74ffdc1a81e3ad.exe windows:4 windows x86 arch:x86
0966c83fb9492502eefb9f26fb825b70
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
LoadLibraryA
GetVersion
GlobalAlloc
GetModuleHandleA
GlobalFree
GetTickCount
LocalAlloc
msvcrt
memmove
_controlfp
_exit
wcschr
user32
SetWindowTextA
DispatchMessageA
DialogBoxParamA
GetClientRect
ShowWindow
MessageBoxA
LoadIconA
GetFocus
GetSysColor
DestroyWindow
DefWindowProcA
GetWindowRect
ScreenToClient
PostQuitMessage
EndPaint
CreateWindowExA
SetFocus
EndDialog
BeginPaint
GetMessageA
gdi32
GetTextColor
GetDeviceCaps
SetPixel
GetObjectA
GetStockObject
CreateFontIndirectA
PatBlt
DeleteObject
BitBlt
GetTextMetricsA
CreateSolidBrush
SelectObject
MoveToEx
GetBkColor
GetTextExtentPoint32A
GetPixel
SetROP2
LineTo
ExtTextOutA
Sections
.text Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 672KB - Virtual size: 676KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 15KB - Virtual size: 724KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ