Static task
static1
Behavioral task
behavioral1
Sample
16be4980ae971389fa474c58dbb977ef.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
16be4980ae971389fa474c58dbb977ef.exe
Resource
win10v2004-20231215-en
General
-
Target
16be4980ae971389fa474c58dbb977ef
-
Size
2.6MB
-
MD5
16be4980ae971389fa474c58dbb977ef
-
SHA1
2d7c44ee9a5406e17fe7d4cf8001564106c68b64
-
SHA256
331696533721a317d99ce77059d80cee0124c375c6b3f035078b84e9ad32e1b9
-
SHA512
143a32d0ea9e1e062803adbc9ac1c8b20a78d5950d76f2bbb7d2e95a03700714ec8f2eca0c5633cd67a8a6d84be32d8e99b8f4a4623855b7644a49e01883ce13
-
SSDEEP
49152:zLiJWCnCLXG90+1HBqcyHLXIADuv+Y3lOzQV7Cka7hYKiZVTnz99fIWAubzhueET:z5a70+1cHrXuBvV7AWKiXnz99fIWpXEm
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 16be4980ae971389fa474c58dbb977ef
Files
-
16be4980ae971389fa474c58dbb977ef.exe windows:4 windows x86 arch:x86
f18645951af10a3c31f2c91632339917
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
AdjustTokenPrivileges
ChangeServiceConfig2A
CloseServiceHandle
DeleteService
GetTokenInformation
OpenProcessToken
RegEnumKeyExA
RegQueryInfoKeyA
RegQueryValueA
SetSecurityDescriptorDacl
StartServiceA
kernel32
AddAtomA
CloseHandle
CompareStringA
CreateEventA
CreateMutexA
CreateThread
DeleteFileA
DeviceIoControl
EnterCriticalSection
ExitProcess
ExitThread
FindClose
FindFirstFileA
FindResourceA
FlushFileBuffers
FormatMessageA
FreeLibrary
GetACP
GetConsoleOutputCP
GetCurrentProcessId
GetFileSize
GetFileTime
GetFullPathNameA
GetLastError
GetLocaleInfoA
GetModuleHandleA
GetOEMCP
GetPrivateProfileStringA
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetStdHandle
GetSystemInfo
GetSystemTimeAsFileTime
GetThreadTimes
GetTickCount
GetTimeZoneInformation
GetVersionExA
HeapDestroy
HeapReAlloc
HeapSize
InitializeCriticalSection
InterlockedDecrement
InterlockedExchange
InterlockedIncrement
LeaveCriticalSection
LoadLibraryA
LocalFree
MoveFileA
MultiByteToWideChar
OpenProcess
OutputDebugStringA
QueryPerformanceCounter
ReadFile
ReleaseMutex
RemoveDirectoryA
SearchPathA
SetEnvironmentVariableA
SetErrorMode
SetEvent
SetHandleCount
Sleep
TerminateProcess
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
WideCharToMultiByte
WriteConsoleA
WritePrivateProfileStringA
lstrcpyA
lstrcpynA
ole32
CreateOleAdviseHolder
OleInitialize
user32
CallWindowProcA
CharNextA
CharUpperA
CheckDlgButton
DrawFocusRect
EndPaint
FillRect
GetClassNameA
GetClientRect
GetMessageA
GetWindow
GetWindowLongA
GetWindowPlacement
GetWindowTextA
InflateRect
IsDlgButtonChecked
LoadBitmapA
LoadIconA
LoadImageA
MessageBoxA
RegisterClassA
RegisterClassExA
RegisterClipboardFormatA
ReleaseDC
SetDlgItemTextA
SetFocus
SetWindowPos
UpdateWindow
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
Sections
.text Size: 35KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 6.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2.6MB - Virtual size: 2.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ