Static task
static1
Behavioral task
behavioral1
Sample
1c8a9be42051f12b13028c3f56a88e70.exe
Resource
win7-20231215-en
General
-
Target
1c8a9be42051f12b13028c3f56a88e70
-
Size
659KB
-
MD5
1c8a9be42051f12b13028c3f56a88e70
-
SHA1
726a50bb26f4644ad3bbf0fd3d6777c0a18d9884
-
SHA256
018695bc554cbaa5b72406785a96bd2e1af41d955c8bb02bb9d45d1fd14f3cee
-
SHA512
cec0f025d9ba32c397cab8698c4de36217ca8c502300212383ef46a481a7565ccc26accb743e8dfd3b3e9c5f9d60198fd1ab7d9d3ed74ac2f1cf732cfef02762
-
SSDEEP
12288:6uEHQptBbtpZsEeXD/bfJJpXKaahMAYpOE:x6QptNZsEAD1JpXKxhZC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1c8a9be42051f12b13028c3f56a88e70
Files
-
1c8a9be42051f12b13028c3f56a88e70.exe windows:5 windows x86 arch:x86
2c1616887c7884baf1b3dff9b172f504
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitThread
CreateThread
GetCommandLineA
GetStartupInfoA
HeapAlloc
HeapFree
HeapReAlloc
RtlUnwind
ExitProcess
RaiseException
VirtualAlloc
SetStdHandle
GetFileType
HeapSize
GetACP
IsValidCodePage
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
GetTimeZoneInformation
GetConsoleCP
GetConsoleMode
GetStdHandle
GetSystemTimeAsFileTime
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
InitializeCriticalSectionAndSpinCount
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetProcessHeap
CompareStringW
SetEnvironmentVariableA
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetOEMCP
GetCPInfo
SetErrorMode
GetModuleHandleW
InterlockedIncrement
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
TlsGetValue
GlobalFlags
GlobalGetAtomNameA
GlobalFindAtomA
lstrcmpW
GetVersionExA
InterlockedDecrement
GetFileTime
GetFileSizeEx
CreateFileA
GetFullPathNameA
GetVolumeInformationA
GetCurrentProcess
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
LocalAlloc
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
FormatMessageA
LocalFree
SuspendThread
SetThreadPriority
WritePrivateProfileStringA
GlobalAddAtomA
GetCurrentProcessId
SetLastError
GlobalDeleteAtom
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
LoadLibraryA
CompareStringA
InterlockedExchange
lstrcmpA
FreeLibrary
GetModuleHandleA
GetProcAddress
lstrlenA
FreeResource
ResumeThread
CloseHandle
ResetEvent
GlobalFree
GlobalUnlock
MulDiv
CreateEventA
GlobalAlloc
SetEvent
GlobalLock
DeleteFileA
GetTempPathA
FileTimeToLocalFileTime
FindNextFileA
GetModuleFileNameA
GetLocalTime
FindClose
FindFirstFileA
MultiByteToWideChar
GetModuleFileNameW
FileTimeToSystemTime
GetFileAttributesA
Sleep
WaitForSingleObject
CreateMutexA
LockResource
GetLastError
SizeofResource
WideCharToMultiByte
LoadResource
FreeEnvironmentStringsA
FindResourceA
user32
DestroyMenu
UnregisterClassA
LoadCursorA
GetSysColorBrush
ShowWindow
SetWindowTextA
IsDialogMessageA
RegisterWindowMessageA
SendDlgItemMessageA
WinHelpA
GetCapture
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
GetForegroundWindow
GetTopWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetMenu
SetForegroundWindow
UpdateWindow
CreateWindowExA
GetClassInfoExA
GetClassInfoA
AdjustWindowRectEx
PtInRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
GetMenu
SetWindowLongA
SetWindowPos
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
UnhookWindowsHookEx
CharUpperA
EndPaint
BeginPaint
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
GetWindow
SetFocus
GetMenuItemID
GetMenuItemCount
GetSubMenu
GetDesktopWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
GetDlgItem
GetNextDlgTabItem
EndDialog
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
IsWindowVisible
GetKeyState
PeekMessageA
GetCursorPos
RegisterClassA
ValidateRect
GetWindowThreadProcessId
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
MessageBoxA
SetCursor
PostQuitMessage
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
GetParent
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
FillRect
GetDC
SetRect
InvalidateRect
ReleaseDC
GetSysColor
CopyRect
IsIconic
LoadIconA
DrawIcon
FindWindowExA
GetClientRect
SendMessageA
GetWindowTextA
EnumChildWindows
IsWindow
PostMessageA
GetSystemMetrics
EnableWindow
FindWindowA
gdi32
GetStockObject
GetObjectA
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
Escape
ExtTextOutA
TextOutA
RectVisible
CreateSolidBrush
GetClipBox
SetMapMode
SetTextColor
SetBkColor
RestoreDC
SaveDC
CreateBitmap
BitBlt
DeleteDC
GetDeviceCaps
DeleteObject
SelectObject
CreateCompatibleDC
CreateCompatibleBitmap
PtVisible
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
advapi32
CryptDestroyHash
RegSetValueExA
RegCreateKeyExA
RegEnumKeyA
RegDeleteKeyA
CryptHashData
RegQueryValueExA
CryptCreateHash
CryptAcquireContextA
CryptReleaseContext
CryptGetHashParam
RegCloseKey
RegOpenKeyA
RegQueryValueA
RegOpenKeyExA
RegEnumKeyExA
shell32
ShellExecuteExA
SHGetSpecialFolderLocation
SHGetMalloc
SHGetPathFromIDListA
SHGetFolderPathA
SHGetSpecialFolderPathA
comctl32
InitCommonControlsEx
shlwapi
PathFindFileNameA
UrlUnescapeA
PathStripToRootA
PathIsUNCA
PathFindExtensionA
ole32
CoCreateInstance
CoUninitialize
CoInitialize
CreateStreamOnHGlobal
oleaut32
VariantTimeToSystemTime
SystemTimeToVariantTime
OleLoadPicture
SysAllocString
SysStringLen
SysFreeString
VariantClear
VariantChangeType
VariantInit
wininet
HttpOpenRequestA
InternetOpenUrlA
InternetConnectA
HttpSendRequestA
InternetReadFile
InternetWriteFile
InternetSetFilePointer
InternetSetStatusCallback
InternetOpenA
InternetGetLastResponseInfoA
InternetCloseHandle
HttpQueryInfoA
InternetErrorDlg
FtpGetFileA
InternetCrackUrlA
InternetCanonicalizeUrlA
InternetQueryOptionA
InternetQueryDataAvailable
Sections
.text Size: 229KB - Virtual size: 229KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 48KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 372KB - Virtual size: 371KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ