Static task
static1
Behavioral task
behavioral1
Sample
21be088f6b64b2b40a91565d04843749.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
21be088f6b64b2b40a91565d04843749.exe
Resource
win10v2004-20231215-en
General
-
Target
21be088f6b64b2b40a91565d04843749
-
Size
352KB
-
MD5
21be088f6b64b2b40a91565d04843749
-
SHA1
e611594cb12c2086bb136799cc13f8a30c8e2e9d
-
SHA256
4dd656a2e1a029e7cfc44c3a8f3d9604d2d7ea01fd62cf84efffa0031e9d5567
-
SHA512
9335cfac361dc21672f6ff176195f7468e1e003b746790a62758e17b56bebad2659daf736cd36cac56495ecde55686006b70893103e7f96d4849bac02ed5087d
-
SSDEEP
6144:Bz7uPqHkcpV7c0AdX3KSdA5AXOjVgVmXEtjazXfffN3ZQ5kTNNzz:N6CHxv7c0Qh14CjEfffNqe5Nz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 21be088f6b64b2b40a91565d04843749
Files
-
21be088f6b64b2b40a91565d04843749.exe windows:4 windows x86 arch:x86
7eecccc453d163c7691736997a633297
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GrayStringA
DrawAnimatedRects
UnhookWindowsHookEx
ShowWindow
SetMessageExtraInfo
CreateWindowExA
VkKeyScanExA
SetWindowTextW
DrawCaption
SendMessageTimeoutA
DrawTextExA
SwitchDesktop
UpdateWindow
GetMenuItemCount
SetSysColors
GetMenuItemID
FrameRect
MessageBoxW
SetCapture
ValidateRect
RegisterClassA
ExitWindowsEx
MessageBoxIndirectA
DrawStateA
CreateWindowExW
DefWindowProcA
DestroyWindow
RegisterClassExA
GetMenuInfo
GetDoubleClickTime
GetClipboardOwner
advapi32
RegSetValueW
CryptDestroyKey
CryptDestroyHash
kernel32
GetOEMCP
LoadLibraryA
CreateMutexA
OpenMutexA
GetEnvironmentStringsW
CloseHandle
CreateMutexW
SetFilePointer
GetFileType
HeapFree
InterlockedExchange
GetCurrentProcessId
IsBadWritePtr
GetPrivateProfileIntA
RtlUnwind
HeapCreate
CompareStringA
HeapDestroy
VirtualAlloc
LCMapStringW
QueryPerformanceCounter
GetEnvironmentStrings
GetCurrentThread
TlsFree
GetStringTypeW
GetModuleFileNameW
TlsAlloc
FreeEnvironmentStringsW
SetLastError
VirtualFree
GetStringTypeA
HeapAlloc
GetCurrentThreadId
GetACP
VirtualQuery
TlsGetValue
CompareStringW
WriteConsoleOutputAttribute
GetLastError
FlushFileBuffers
GetCurrentProcess
LCMapStringA
GetDiskFreeSpaceExW
GetConsoleCP
InitializeCriticalSection
WriteFile
GetStartupInfoA
VirtualAllocEx
CopyFileA
FreeEnvironmentStringsA
GetLogicalDriveStringsA
GetModuleHandleA
WideCharToMultiByte
GetCPInfo
TlsSetValue
GetProcAddress
SetConsoleCursorPosition
EnterCriticalSection
GetStdHandle
ReadFile
HeapReAlloc
UnhandledExceptionFilter
TerminateProcess
GetVersion
ExpandEnvironmentStringsA
ExitProcess
GetLocalTime
GetCommandLineA
GetModuleFileNameA
InterlockedDecrement
DeleteCriticalSection
SetStdHandle
GetTickCount
SetEnvironmentVariableA
GetSystemTime
WaitCommEvent
GetSystemTimeAsFileTime
SetHandleCount
InterlockedIncrement
GlobalGetAtomNameA
GetTimeZoneInformation
LeaveCriticalSection
MultiByteToWideChar
comctl32
CreatePropertySheetPageW
ImageList_Create
ImageList_SetOverlayImage
ImageList_GetBkColor
ImageList_GetImageCount
ImageList_GetDragImage
CreateStatusWindowW
InitCommonControlsEx
InitMUILanguage
ImageList_GetImageInfo
Sections
.text Size: 136KB - Virtual size: 133KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 72KB - Virtual size: 69KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 88KB - Virtual size: 101KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ