Static task
static1
Behavioral task
behavioral1
Sample
21c0d6b686599103189760aae1d4f4ba.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
21c0d6b686599103189760aae1d4f4ba.exe
Resource
win10v2004-20231215-en
General
-
Target
21c0d6b686599103189760aae1d4f4ba
-
Size
221KB
-
MD5
21c0d6b686599103189760aae1d4f4ba
-
SHA1
75b62088ad3ec03d243af5d27ca5f1a66233f749
-
SHA256
7895dc2417323458456a0ac5dba0b57c87b632cccd2b240ecef6ed0f846235af
-
SHA512
3b9dc992f8d30f788d6a8f2db75e560e70520f8ad4ca2e6352bfff86756a6362e06fc8c91a640eb6ab0dc9244ee27ac58bd3f33c29ced8b231053b47a8eaf7dd
-
SSDEEP
3072:EZC9P1+JQHc6/aFR/oC6hvvtyyQuUZ1XbnFgZnCZT4k9LyTMbnjqvYoHEfW/ru:EgaJU8SvhvFynuUZteO99LOMuDr/ru
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 21c0d6b686599103189760aae1d4f4ba
Files
-
21c0d6b686599103189760aae1d4f4ba.exe windows:4 windows x86 arch:x86
2cac03f712463d0c66251f48f126d902
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLastError
OutputDebugStringA
SuspendThread
CreateProcessA
ResumeThread
WriteProcessMemory
OpenProcess
ReadProcessMemory
SetCurrentDirectoryA
RaiseException
GetModuleFileNameA
CompareStringW
CompareStringA
GetOEMCP
GetACP
GetCPInfo
OpenMutexA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
MultiByteToWideChar
SetStdHandle
FlushFileBuffers
SetFilePointer
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
CreateMutexA
FormatMessageA
LocalFree
CreateEventA
WaitForSingleObject
WaitForMultipleObjectsEx
CreateThread
GetCurrentThread
SetEnvironmentVariableA
MulDiv
LocalAlloc
WriteFile
ReadFile
GetFileSize
CreateFileA
ResetEvent
GetCurrentDirectoryA
FindFirstFileA
FindClose
TerminateProcess
Sleep
GetExitCodeProcess
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
LeaveCriticalSection
GetCurrentProcess
lstrlenA
DuplicateHandle
CloseHandle
DeleteFileA
SetFileAttributesA
FindNextFileA
MoveFileA
RemoveDirectoryA
GetProcAddress
FreeLibrary
LoadLibraryA
GetTickCount
FileTimeToDosDateTime
GetSystemTimeAsFileTime
GetFileAttributesA
CreateDirectoryA
GetVersion
HeapFree
HeapAlloc
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
ExitProcess
SetEndOfFile
InterlockedDecrement
InterlockedIncrement
HeapReAlloc
HeapSize
GetCurrentThreadId
TlsSetValue
TlsAlloc
SetLastError
TlsGetValue
RtlUnwind
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
user32
LoadIconA
RegisterClassExA
CreateWindowExA
UpdateWindow
PeekMessageA
TranslateMessage
DispatchMessageA
BeginPaint
EndPaint
DefWindowProcA
GetClientRect
LoadCursorA
SetCursor
SetWindowTextA
MessageBeep
GetWindowRect
SendMessageTimeoutA
IsWindowVisible
ShowWindow
SetForegroundWindow
BringWindowToTop
AdjustWindowRectEx
IsIconic
SystemParametersInfoA
MoveWindow
MessageBoxA
GetDesktopWindow
GetActiveWindow
GetTabbedTextExtentA
GetDC
ReleaseDC
wsprintfA
GetForegroundWindow
GetWindowThreadProcessId
GetWindowLongA
EnumThreadWindows
EnumWindows
PostMessageA
gdi32
SetBkMode
CreateDIBSection
GetObjectA
BitBlt
CreateCompatibleDC
DeleteDC
CreateSolidBrush
CreatePen
Rectangle
LPtoDP
SetTextColor
TextOutA
CreateFontA
SelectObject
DeleteObject
advapi32
CryptReleaseContext
RegOpenKeyExA
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
CryptAcquireContextA
CryptDestroyHash
CryptDestroyKey
CryptVerifySignatureA
CryptImportKey
CryptHashData
CryptCreateHash
winmm
timeGetTime
raw_005.wdt
?IsActivityTrackerEnabled@@YA_NXZ
?HasBeenActivitySinceLastReset@@YA_NXZ
?ResetActivityCheck@@YAXXZ
?EnableActivityTracker@@YA_N_N@Z
imagehlp
MapAndLoad
UnMapAndLoad
comctl32
_TrackMouseEvent
Sections
.text Size: 156KB - Virtual size: 152KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 36KB - Virtual size: 49KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.FFF Size: 256B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.FFF Size: 256B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.FFF Size: 256B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.FFF Size: 256B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE