Static task
static1
Behavioral task
behavioral1
Sample
183115eced4be49de785acf855768ab8.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
183115eced4be49de785acf855768ab8.exe
Resource
win10v2004-20231215-en
General
-
Target
183115eced4be49de785acf855768ab8
-
Size
526KB
-
MD5
183115eced4be49de785acf855768ab8
-
SHA1
d63483b2a4d5a47148bda3caa4d2bed462f6765d
-
SHA256
2eed0674acb06093b49b3770ef0508d905a2197640c13546610448a8ec8eb142
-
SHA512
492cdaf4674042da20e3258c415cde313f686535fcb3e754ba8171703825cffb7667abbb24b6323c866219d5c6bd7d6ab79a3ca386229601c431ed5478e62bbe
-
SSDEEP
6144:FCJn8bUwIcxLELka44Fvtl1A0BrQB2OdQDmxrFqF98OYZWJWp92O6gYIxNYPJB6L:FCJn8bGcqdK0BrQBRdOmVUF1Wb2Tx8k
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 183115eced4be49de785acf855768ab8
Files
-
183115eced4be49de785acf855768ab8.exe windows:4 windows x86 arch:x86
83a0a8254ac78763d7ead85fa41d3aa4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
ExtCreatePen
PolylineTo
Rectangle
SetWinMetaFileBits
SetTextCharacterExtra
DeleteColorSpace
GetOutlineTextMetricsW
SetBrushOrgEx
GetCharWidthA
SetBoundsRect
CreateColorSpaceW
SetPolyFillMode
StartDocW
GetFontLanguageInfo
SetAbortProc
GetPixel
kernel32
GetFileType
LoadLibraryA
GetConsoleOutputCP
GetOEMCP
EnumSystemLocalesA
IsValidLocale
GetLocaleInfoA
FreeEnvironmentStringsA
GetLastError
LCMapStringA
GetCurrentProcess
SetConsoleCtrlHandler
IsDebuggerPresent
HeapDestroy
InterlockedIncrement
SetConsoleCP
VirtualAlloc
TryEnterCriticalSection
EnumCalendarInfoExA
GetConsoleMode
VirtualQuery
GetTimeFormatA
IsValidCodePage
SetUnhandledExceptionFilter
GetModuleFileNameA
GetProcessHeap
GetPrivateProfileStringW
GetCommandLineA
HeapSize
ReadFile
LocalCompact
MultiByteToWideChar
GetLocaleInfoW
TlsGetValue
TlsSetValue
HeapCreate
Sleep
UnhandledExceptionFilter
GetStringTypeW
GetStdHandle
GetNamedPipeHandleStateW
FindNextFileA
GetProcAddress
HeapAlloc
InterlockedDecrement
GetConsoleCP
WideCharToMultiByte
GetDateFormatA
GetEnvironmentStringsW
GetTimeZoneInformation
GetStringTypeA
HeapReAlloc
AddAtomA
GetCPInfo
TransactNamedPipe
ReadConsoleOutputW
CompareStringA
FreeEnvironmentStringsW
EnterCriticalSection
LocalUnlock
GetTickCount
InterlockedExchange
GetACP
QueryPerformanceCounter
TlsFree
ExitProcess
LCMapStringW
GetUserDefaultLCID
WriteFile
SetHandleCount
GetEnvironmentStrings
WriteConsoleA
GetFileAttributesA
GetCurrentThreadId
CreateMutexA
OpenMutexA
TlsAlloc
GetNamedPipeInfo
FreeLibrary
GetCurrentProcessId
CompareStringW
InitializeCriticalSection
DeleteCriticalSection
GetSystemTimeAsFileTime
LeaveCriticalSection
GetPriorityClass
FlushFileBuffers
GetVersionExA
CloseHandle
GetModuleHandleA
CommConfigDialogW
SetLastError
SetVolumeLabelW
SetEnvironmentVariableA
GetStartupInfoA
TerminateProcess
VirtualFree
GetCurrentThread
RtlUnwind
CreateFileA
SetStdHandle
WriteConsoleW
GetProfileSectionW
SetFilePointer
HeapFree
GetMailslotInfo
shell32
SHQueryRecycleBinA
SHFileOperationA
InternalExtractIconListA
comctl32
InitCommonControlsEx
user32
MapDialogRect
EnumDisplaySettingsA
RegisterClassA
GetUserObjectInformationA
GetThreadDesktop
IsChild
RegisterClassExA
SetDlgItemTextW
DdeQueryStringW
WinHelpA
CallMsgFilter
MessageBeep
GetWindowDC
TabbedTextOutW
GetTabbedTextExtentA
SetMenuItemInfoA
EnumDesktopsW
MapVirtualKeyA
OpenDesktopW
LoadMenuIndirectW
SendNotifyMessageA
DrawFrame
MonitorFromPoint
UnregisterClassA
Sections
.text Size: 195KB - Virtual size: 195KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 317KB - Virtual size: 316KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ