Static task
static1
Behavioral task
behavioral1
Sample
17da5023b6a9d9d004fa9330030b8fb8.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
17da5023b6a9d9d004fa9330030b8fb8.exe
Resource
win10v2004-20231215-en
General
-
Target
17da5023b6a9d9d004fa9330030b8fb8
-
Size
178KB
-
MD5
17da5023b6a9d9d004fa9330030b8fb8
-
SHA1
5741223d00b44fc0c2250ae1fe878dc065c92dbb
-
SHA256
75edfb822e53c7cea1842a084f23e3ba9daa79599d9da86fdc6537206c0a1a99
-
SHA512
b69363b3a64453ea7c29781d4c3d8105a09ca41c213ec2e185a4ddbab323c9caadf2ffd09382769737464f677e1146873888a64d19a934ef9247e8d8c94df377
-
SSDEEP
3072:iLRAqsUDSAEp4du/DuIMHlj7IC2q4PQc8bdfWAdU39XXM7urq9K2b:GzD4p4dqyYKnWAu9nMSr2Z
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 17da5023b6a9d9d004fa9330030b8fb8
Files
-
17da5023b6a9d9d004fa9330030b8fb8.exe windows:4 windows x86 arch:x86
2de26713dae297392682cde0a4da740f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
SHGetDiskFreeSpaceA
SHGetSpecialFolderLocation
user32
SetActiveWindow
SendMessageW
PtInRect
LoadCursorA
MapVirtualKeyA
ScrollWindow
PeekMessageW
PeekMessageA
MessageBeep
LoadIconA
RegisterClassA
ReleaseCapture
OpenClipboard
MapWindowPoints
PostMessageA
MessageBoxA
OemToCharA
SendMessageA
LoadKeyboardLayoutA
PostQuitMessage
ScreenToClient
OffsetRect
RegisterWindowMessageA
RedrawWindow
RemoveMenu
ReleaseDC
RemovePropA
LoadBitmapA
LoadStringA
RegisterClipboardFormatA
shlwapi
SHDeleteKeyA
SHQueryValueExA
PathGetCharTypeA
SHGetValueA
PathFileExistsA
SHDeleteValueA
SHQueryInfoKeyA
SHEnumValueA
SHStrDupA
version
VerQueryValueA
kernel32
GetVersionExA
GetCommandLineW
SetThreadLocale
ExitProcess
SetErrorMode
GetDiskFreeSpaceA
WaitForSingleObject
lstrcmpiA
lstrlenA
LockResource
GetLocalTime
LoadLibraryA
GetModuleHandleA
GetCurrentProcess
lstrcpyA
GetModuleFileNameA
GetSystemDefaultLangID
SetHandleCount
GetModuleHandleW
GetCPInfo
RaiseException
GetStringTypeW
ResetEvent
IsBadHugeReadPtr
lstrlenW
lstrcmpA
GetFileType
GetUserDefaultLCID
CompareStringA
FindResourceA
LocalReAlloc
GetEnvironmentStrings
GetCommandLineA
GetStringTypeA
LocalAlloc
GetACP
GetProcessHeap
GetLastError
EnumCalendarInfoA
GetFileSize
VirtualAlloc
GlobalDeleteAtom
GetProcAddress
HeapAlloc
GlobalAlloc
WideCharToMultiByte
SetEvent
HeapDestroy
ReadFile
CreateEventA
VirtualFree
SetLastError
GetFullPathNameA
GetThreadLocale
ExitThread
GetLocaleInfoA
GetDateFormatA
SetEndOfFile
lstrcatA
SizeofResource
MoveFileA
EnterCriticalSection
oleaut32
SysStringLen
SysReAllocStringLen
SysAllocStringLen
Sections
.text Size: 42KB - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 116KB - Virtual size: 116KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gdata Size: 512B - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
DATA Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 864B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ