Static task
static1
Behavioral task
behavioral1
Sample
17e78af5ec3b77a4a0a4cbfd26066c6e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
17e78af5ec3b77a4a0a4cbfd26066c6e.exe
Resource
win10v2004-20231215-en
General
-
Target
17e78af5ec3b77a4a0a4cbfd26066c6e
-
Size
6.2MB
-
MD5
17e78af5ec3b77a4a0a4cbfd26066c6e
-
SHA1
99185c4583354a70f6925e1a60e0bac86bd874df
-
SHA256
3fbe9e8f55655496572c03b6626d62fd49e206134243fd8a1bf3c9a1c0c17fd7
-
SHA512
af1182593166899ed4b488dd7d1e0c0fbb718235c4769fbe7467582c41492aa56b851d3f3506be2d4860cbd911a7a1b588ce2a3ae4d5107698e6daac615cda84
-
SSDEEP
196608:6wFKDHpWX+0pk09M2eJjbr0AplzBFS/98:65DpWq2M24rJlzyF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 17e78af5ec3b77a4a0a4cbfd26066c6e
Files
-
17e78af5ec3b77a4a0a4cbfd26066c6e.exe windows:6 windows x86 arch:x86
f3c5708426982979b23eae40c80e3dc9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
LockResource
GlobalAlloc
Process32FirstW
GlobalFree
CloseHandle
FreeConsole
CreateThread
LoadResource
FindResourceW
GetProcAddress
ExitProcess
GetModuleHandleW
GetConsoleWindow
OpenThread
WriteConsoleW
CreateFileA
CreateFileW
GetProcessHeap
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
HeapReAlloc
Sleep
Process32NextW
CreateToolhelp32Snapshot
FreeResource
SuspendThread
GetCurrentThreadId
Thread32First
SetFilePointer
Thread32Next
WriteFile
lstrlenW
HeapSize
GetCurrentProcess
ReadConsoleW
ReadFile
EnumSystemLocalesW
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
EncodePointer
DecodePointer
MultiByteToWideChar
WideCharToMultiByte
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
CompareStringW
LCMapStringW
GetLocaleInfoW
GetStringTypeW
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
RtlUnwind
RaiseException
GetLastError
FreeLibrary
LoadLibraryExW
GetModuleHandleExW
GetStdHandle
GetModuleFileNameW
GetCommandLineA
GetCommandLineW
GetFileSizeEx
SetFilePointerEx
GetFileType
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
HeapFree
HeapAlloc
IsValidLocale
GetUserDefaultLCID
SetEndOfFile
user32
GetCursorPos
GetWindowRect
SendMessageTimeoutW
InvertRect
EnumChildWindows
CallNextHookEx
ShowWindow
ExitWindowsEx
MessageBoxA
UnhookWindowsHookEx
GetWindowDC
SetWindowsHookExW
GetDesktopWindow
SwapMouseButton
SetCursorPos
ReleaseDC
gdi32
BitBlt
advapi32
LookupPrivilegeValueW
AdjustTokenPrivileges
RegCloseKey
CryptAcquireContextW
CryptGenRandom
RegSetValueExW
OpenProcessToken
RegCreateKeyW
RegOpenKeyW
GetTokenInformation
shell32
ShellExecuteW
winmm
PlaySoundW
Sections
.text Size: 119KB - Virtual size: 118KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 57KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6.0MB - Virtual size: 6.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ