Static task
static1
Behavioral task
behavioral1
Sample
15663e852ea288e8576f6bd88df6651f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
15663e852ea288e8576f6bd88df6651f.exe
Resource
win10v2004-20231215-en
General
-
Target
15663e852ea288e8576f6bd88df6651f
-
Size
141KB
-
MD5
15663e852ea288e8576f6bd88df6651f
-
SHA1
2612468a1435c689b451cbb96254a9a7ad958fc5
-
SHA256
6eedd268f66fb001d6491a159d6f35175a7039210690b1fe45db8c7f7744361c
-
SHA512
650272105bd2b9ac9c7f3f1ab20196e54c98a4f363802d5ade6d615a0489be06376c8ab3921b826f3bee28f3a8ba9367b8144ba173e567d4843d291178ea6dab
-
SSDEEP
3072:7onlHd5QaipSpgviM3DFubvMl0ygVg+TzKQQvoNKdD6n6:7onlHd5Qa2vH3ko0ygVgMzlQS6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 15663e852ea288e8576f6bd88df6651f
Files
-
15663e852ea288e8576f6bd88df6651f.exe windows:4 windows x86 arch:x86
21a7231994e400b14fc4da95deb29edd
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comdlg32
GetOpenFileNameA
comctl32
ord17
shell32
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetSpecialFolderLocation
kernel32
GetEnvironmentStringsW
lstrcpyA
lstrlenA
GetModuleFileNameA
GetModuleHandleA
lstrcpynA
WriteFile
lstrcatA
GetTempPathA
CloseHandle
ReadFile
GetFileSize
CreateFileA
LeaveCriticalSection
EnterCriticalSection
GetCurrentThreadId
FlushInstructionCache
GetCurrentProcess
lstrcmpA
DeleteFileA
SetFilePointer
SetFileTime
SetCurrentDirectoryA
CreateDirectoryA
SetFileAttributesA
GetFileAttributesA
InterlockedDecrement
InitializeCriticalSection
CompareStringA
SetEndOfFile
GetStringTypeW
GetStringTypeA
LoadLibraryA
InterlockedIncrement
SetStdHandle
LCMapStringW
LCMapStringA
MultiByteToWideChar
GetOEMCP
GetACP
GetCPInfo
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
FlushFileBuffers
GetFileType
GetStdHandle
SetHandleCount
DeleteCriticalSection
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
TerminateProcess
GetProcAddress
GetFullPathNameA
WideCharToMultiByte
FileTimeToLocalFileTime
CompareStringW
GetStartupInfoA
FindFirstFileA
IsBadWritePtr
HeapReAlloc
RtlUnwind
GetLastError
SetEnvironmentVariableA
GetCurrentDirectoryA
HeapFree
HeapAlloc
GetTimeZoneInformation
GetSystemTime
GetLocalTime
FindClose
FileTimeToSystemTime
VirtualAlloc
GetDriveTypeA
VirtualFree
SetLastError
GetCommandLineA
GetVersion
ExitProcess
TlsSetValue
TlsAlloc
TlsGetValue
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
user32
ShowWindow
PeekMessageA
IsDialogMessageA
TranslateMessage
DispatchMessageA
SendMessageA
CreateDialogParamA
CheckDlgButton
GetWindowTextA
wsprintfA
IsDlgButtonChecked
LoadCursorA
SetCursor
GetDesktopWindow
SetFocus
DestroyWindow
PostMessageA
GetActiveWindow
DialogBoxParamA
EnableWindow
LoadStringA
MessageBoxA
SetWindowLongA
EndDialog
GetSystemMetrics
GetWindowRect
MoveWindow
GetDlgItem
SetWindowTextA
advapi32
GetSecurityDescriptorControl
ole32
CoRegisterClassObject
CoInitialize
CoUninitialize
CoRevokeClassObject
Sections
.text Size: 88KB - Virtual size: 87KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ