Static task
static1
Behavioral task
behavioral1
Sample
17ea0762901c65124c4d65db1c57d898.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
17ea0762901c65124c4d65db1c57d898.exe
Resource
win10v2004-20231215-en
General
-
Target
17ea0762901c65124c4d65db1c57d898
-
Size
276KB
-
MD5
17ea0762901c65124c4d65db1c57d898
-
SHA1
7b4012faeccc1ee905b5141c867591c5007b837b
-
SHA256
4ccda79e80ef063913a59082199e3a17b21de61da26223e4bebb12c8bb16e906
-
SHA512
fed8be899de5e2cae73487df4cb31c9530ec583007867bbbb771005e82fc99a4a028c371c18d974a045546612828164bd535414b62d5b5872c594f436d4114e0
-
SSDEEP
6144:63pO8Xa+OTL3C8nIVb3bxrTPOTxds9R/4HMK:6pO8q+OTrBAb5Tx94R
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 17ea0762901c65124c4d65db1c57d898
Files
-
17ea0762901c65124c4d65db1c57d898.exe windows:4 windows x86 arch:x86
a30856f2727f5fbb1a6c668e084d0a68
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcpyA
CreateThread
DeleteFileA
GetVersion
CloseHandle
GetVersionExA
CompareStringA
CreateMutexA
GetModuleHandleA
GetModuleFileNameA
LockResource
GetLocalTime
SetFileAttributesA
CopyFileA
GetThreadLocale
FileTimeToSystemTime
FileTimeToLocalFileTime
SetLastError
LoadLibraryA
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
FreeLibrary
LocalAlloc
LocalFree
FormatMessageA
FindClose
FindNextFileA
FindFirstFileA
GlobalUnlock
GlobalLock
GlobalAlloc
GetLastError
GlobalFree
GetProcAddress
InterlockedDecrement
WaitForSingleObject
CreateFileA
GetFileAttributesA
GetFileSize
GetFileTime
ReadFile
WriteFile
SetFilePointer
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
DuplicateHandle
GetCurrentProcess
GetVolumeInformationA
GetFullPathNameA
GlobalGetAtomNameA
lstrcmpA
GetCurrentProcessId
TlsGetValue
GlobalReAlloc
GlobalHandle
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
InterlockedIncrement
GlobalFlags
GetCurrentThreadId
lstrcmpW
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
GetCPInfo
GetOEMCP
GetCurrentDirectoryA
HeapFree
HeapAlloc
VirtualAlloc
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapReAlloc
GetSystemTimeAsFileTime
GetCommandLineA
GetProcessHeap
GetStartupInfoA
RtlUnwind
RaiseException
SetStdHandle
GetFileType
HeapSize
ExitProcess
SetHandleCount
GetStdHandle
HeapDestroy
HeapCreate
VirtualFree
GetConsoleCP
GetConsoleMode
Sleep
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTimeZoneInformation
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
GetLocaleInfoW
SetEnvironmentVariableA
InterlockedExchange
MultiByteToWideChar
GetACP
CompareStringW
CreateProcessA
SizeofResource
WideCharToMultiByte
GetDriveTypeA
GetWindowsDirectoryA
GetTickCount
LoadResource
GetLocaleInfoA
lstrlenA
FindResourceA
CreateFileW
user32
CallWindowProcA
CopyRect
AdjustWindowRectEx
GetClassInfoA
GetClassInfoExA
PostMessageA
GetMenu
GetClientRect
SetForegroundWindow
MapWindowPoints
GetMessagePos
GetMessageTime
DestroyWindow
GetTopWindow
GetForegroundWindow
RemovePropA
GetPropA
SetPropA
GetClassLongA
GetCapture
WinHelpA
LoadIconA
RegisterWindowMessageA
CheckMenuItem
EnableMenuItem
ModifyMenuA
GetMenuCheckMarkDimensions
SetMenuItemBitmaps
DestroyMenu
SendMessageA
GetParent
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
EnableWindow
GetWindowTextA
GetSystemMetrics
UnhookWindowsHookEx
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
GetSysColorBrush
SetWindowsHookExA
CallNextHookEx
GetKeyState
PeekMessageA
ValidateRect
SetWindowPos
SetWindowLongA
IsWindow
GetDlgItem
GetFocus
ClientToScreen
GetWindow
GetDlgCtrlID
GetWindowRect
GetClassNameA
PtInRect
SetWindowTextA
UnregisterClassA
GetDC
ReleaseDC
RegisterClassA
LoadCursorA
DispatchMessageA
DefWindowProcA
SystemParametersInfoA
IsIconic
GetWindowPlacement
MessageBoxA
CreateWindowExA
TranslateMessage
GetSysColor
LoadBitmapA
GetWindowThreadProcessId
CharUpperA
PostQuitMessage
SetTimer
GetMessageA
shell32
SHGetSpecialFolderLocation
SHGetPathFromIDListA
ole32
CoInitialize
CoUninitialize
CoCreateInstance
shlwapi
UrlUnescapeA
PathIsUNCA
PathFindFileNameA
PathStripToRootA
ws2_32
gethostbyname
WSACleanup
WSAStartup
gethostname
wininet
InternetOpenUrlA
InternetConnectA
HttpSendRequestA
InternetReadFile
InternetWriteFile
InternetCrackUrlA
InternetSetFilePointer
InternetSetStatusCallback
InternetOpenA
InternetGetLastResponseInfoA
InternetCloseHandle
HttpQueryInfoA
InternetCanonicalizeUrlA
InternetQueryOptionA
HttpOpenRequestA
InternetQueryDataAvailable
oleacc
LresultFromObject
CreateStdAccessibleObject
gdi32
SetMapMode
GetClipBox
SetTextColor
SetBkColor
RestoreDC
SaveDC
DeleteObject
GetDeviceCaps
GetStockObject
CreateBitmap
DeleteDC
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
comdlg32
GetFileTitleA
oleaut32
VariantClear
VariantChangeType
VariantInit
Sections
.text Size: 232KB - Virtual size: 230KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ