Static task
static1
Behavioral task
behavioral1
Sample
1608143250a9c7c4dee1384f95b25dfb.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1608143250a9c7c4dee1384f95b25dfb.exe
Resource
win10v2004-20231215-en
General
-
Target
1608143250a9c7c4dee1384f95b25dfb
-
Size
25KB
-
MD5
1608143250a9c7c4dee1384f95b25dfb
-
SHA1
1b22bd604235ce87555641da83ae0c03104285d6
-
SHA256
d132792eb8cd8cde93b01b41c9ca8fa727fc867894e99a2ceaa363ce6990df8e
-
SHA512
50701f3f8da1ebf324d11694f7245274c547dfb38bcaa0e85ab33d7589effb83ca8f0ac530e3f3e24de3edb77f2267404c7440cbd466fafbc8983f46881d091a
-
SSDEEP
192:9CTrJp4kWZpC+KcQBmxmYG/JRqGlGO2Po+WtUFhvGPd7cWQtqrYzI1wlDwZw6O4U:9CTrJp4LZpCyGVG5qce17cWQtQaTKE7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1608143250a9c7c4dee1384f95b25dfb
Files
-
1608143250a9c7c4dee1384f95b25dfb.exe windows:4 windows x86 arch:x86
c2c3c212c4d06dd95bb429ca4b69b809
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
IsTextUnicode
RegCloseKey
RegCreateKeyW
RegOpenKeyExA
RegQueryValueExA
RegQueryValueExW
RegSetValueExW
kernel32
CloseHandle
CompareStringW
CreateFileMappingW
CreateFileW
DeleteFileW
FindClose
FindFirstFileW
FoldStringW
FormatMessageW
GetACP
GetCommandLineW
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetDateFormatW
GetFileAttributesW
GetFileInformationByHandle
GetLastError
GetLocalTime
GetLocaleInfoW
GetModuleHandleA
GetProcAddress
GetStartupInfoA
GetSystemTimeAsFileTime
GetTickCount
GetTimeFormatW
GetUserDefaultLCID
GetUserDefaultUILanguage
GlobalFree
GlobalLock
GlobalUnlock
LoadLibraryA
LocalAlloc
LocalFree
LocalLock
LocalReAlloc
LocalSize
LocalUnlock
MapViewOfFile
MulDiv
MultiByteToWideChar
QueryPerformanceCounter
ReadFile
SetEndOfFile
SetLastError
SetUnhandledExceptionFilter
TerminateProcess
UnhandledExceptionFilter
UnmapViewOfFile
WideCharToMultiByte
WriteFile
lstrcatW
lstrcmpW
lstrcmpiW
lstrcpyW
lstrcpynW
lstrlenW
user32
CharLowerW
CharNextW
CharUpperW
CheckMenuItem
ChildWindowFromPoint
CloseClipboard
CreateDialogParamW
CreateWindowExW
DefWindowProcW
DestroyWindow
DialogBoxParamW
DispatchMessageW
DrawTextExW
EnableMenuItem
EnableWindow
EndDialog
GetClientRect
GetCursorPos
GetDC
GetDesktopWindow
GetDlgCtrlID
GetDlgItem
GetDlgItemTextW
GetFocus
GetForegroundWindow
GetKeyboardLayout
GetMenu
GetMenuState
GetMessageW
GetParent
GetSubMenu
GetSystemMenu
GetSystemMetrics
GetWindowLongW
GetWindowPlacement
GetWindowTextW
InvalidateRect
IsClipboardFormatAvailable
IsDialogMessageW
IsIconic
LoadAcceleratorsW
LoadCursorW
LoadIconW
LoadImageW
LoadStringW
MessageBeep
MessageBoxW
MoveWindow
OpenClipboard
PeekMessageW
PostMessageW
PostQuitMessage
RegisterClassExW
RegisterWindowMessageW
ReleaseDC
ScreenToClient
SendDlgItemMessageW
SendMessageW
SetActiveWindow
SetCursor
SetDlgItemTextW
SetFocus
SetScrollPos
SetWinEventHook
SetWindowLongW
SetWindowPlacement
SetWindowTextW
ShowWindow
TranslateAcceleratorW
TranslateMessage
UnhookWinEvent
UpdateWindow
WinHelpW
wsprintfW
Sections
.text Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 18KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ