Static task
static1
Behavioral task
behavioral1
Sample
147eea6044562e4a54bd77abe351ec1e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
147eea6044562e4a54bd77abe351ec1e.exe
Resource
win10v2004-20231215-en
General
-
Target
147eea6044562e4a54bd77abe351ec1e
-
Size
131KB
-
MD5
147eea6044562e4a54bd77abe351ec1e
-
SHA1
41d61158bc11d3e776965847c2447b9773788714
-
SHA256
228a9e2f873cd80d2bc05b08147f2c3dbecadf541e771e97697b39a198c4663c
-
SHA512
f80181a55e6cba46109fa552ebcc346ccd3918f8efce9009f14508ebbe07bccfe6ede93430de0289b3ab79219fd61fd10d43c5f1f804be750a8caa13c6af400c
-
SSDEEP
3072:PRj4jM8aj2lh1g/aod7pEicaHh++SyOSh0ZXCPyau7iBa76z64r:PRKM8qaLg/17p11HMSaXCUYa76/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 147eea6044562e4a54bd77abe351ec1e
Files
-
147eea6044562e4a54bd77abe351ec1e.exe windows:5 windows x86 arch:x86
32d6af90302bb1fc78eb318cbe2a7789
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
LineTo
ExtCreateRegion
ExtTextOutW
GetStockObject
GetObjectA
GetTextExtentPoint32W
CreateDIBSection
GetCurrentObject
PlayEnhMetaFile
SetBrushOrgEx
CombineRgn
RestoreDC
SetTextAlign
SelectObject
GdiFlush
GetPaletteEntries
SetTextColor
Rectangle
SetDIBits
CreateBrushIndirect
DeleteObject
TextOutA
PatBlt
CreateCompatibleBitmap
CreatePen
ExcludeClipRect
StartPage
SetPixel
user32
UnregisterClassA
GetMenuItemInfoW
TrackPopupMenu
GetDoubleClickTime
EnableWindow
ChildWindowFromPointEx
EnumWindows
CreatePopupMenu
SetWindowLongW
SetCursor
ReleaseDC
GetForegroundWindow
SetParent
ScreenToClient
SetWindowTextA
ShowScrollBar
EqualRect
SetClassLongA
PostThreadMessageA
UnregisterClassW
SetFocus
CallWindowProcW
GetMenuItemCount
GetWindowTextLengthA
GetSysColorBrush
GetSystemMetrics
InsertMenuItemA
SetCaretPos
SetScrollPos
DestroyMenu
SetWindowsHookExA
GetMenu
SetCapture
GetLastActivePopup
SetRect
DrawIconEx
RegisterClassA
SetWindowRgn
HideCaret
SetWindowPlacement
PostMessageA
catssspc
_FDnorm
_Mbrtowc
_Poly
_LRteps
_Dnorm
_LInf
_LSnan
_FExp
_Exp
_FCosh
oleaut32
SetErrorInfo
CreateErrorInfo
SysReAllocStringLen
SafeArrayDestroy
SysFreeString
VariantCopyInd
kernel32
RemoveDirectoryA
MapViewOfFileEx
OpenMutexA
GetModuleFileNameA
GetCurrentThreadId
OpenEventA
VirtualQueryEx
MoveFileA
FlushInstructionCache
QueryPerformanceFrequency
GetProcAddress
FreeResource
lstrlenW
OutputDebugStringA
WaitForMultipleObjects
TerminateProcess
lstrcpyA
FindResourceA
GlobalAlloc
CreateFileW
CloseHandle
CreateFileMappingA
SetFilePointer
GetWindowsDirectoryA
GetExitCodeProcess
HeapFree
GetSystemInfo
CreateFileMappingA
GetVolumeInformationA
lstrcmpA
TerminateProcess
InitializeCriticalSection
VirtualAlloc
VirtualProtect
GetModuleHandleA
SleepEx
SetThreadLocale
lstrlenA
UnmapViewOfFile
FlushFileBuffers
comctl32
ImageList_Replace
ImageList_GetIcon
wininet
InternetReadFile
InternetSetOptionA
ole32
IsEqualGUID
OleSetMenuDescriptor
DoDragDrop
OleSetClipboard
winmm
PlaySoundA
advapi32
RegEnumValueA
Sections
.text Size: 106KB - Virtual size: 108KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 18KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ