Static task
static1
Behavioral task
behavioral1
Sample
21f991b22fd9092452f4767e110964cf.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
21f991b22fd9092452f4767e110964cf.exe
Resource
win10v2004-20231215-en
General
-
Target
21f991b22fd9092452f4767e110964cf
-
Size
63KB
-
MD5
21f991b22fd9092452f4767e110964cf
-
SHA1
94493d2055bee28d5ebfe1900fa17445c7fa744b
-
SHA256
5151b6753703f3a62c3a94eb30111d39dba722c85e8a83e12cf49dbe325ac3f5
-
SHA512
8b3f5074abd9b63e716ed477b3a616206f38f1af047758b6f0785cdbe1cfd08f174eef9ce4a107579a479ac86803ac4d06538cb2ddbabceb56b0c49245113530
-
SSDEEP
1536:hau1Tafv9HpHzknoWHDwhok79srBVrlLf1:hau1Ta9HeoWHDQok7SrBVhLf1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 21f991b22fd9092452f4767e110964cf
Files
-
21f991b22fd9092452f4767e110964cf.exe windows:5 windows x86 arch:x86
d02399ec9d93dec72005c5428ccce527
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
TerminateProcess
IsDebuggerPresent
UnhandledExceptionFilter
LoadLibraryW
EnterCriticalSection
RtlUnwind
LeaveCriticalSection
HeapSize
Sleep
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
InterlockedDecrement
GetCurrentThreadId
SetLastError
InterlockedIncrement
TlsFree
HeapReAlloc
LCMapStringW
MultiByteToWideChar
GetStringTypeW
IsProcessorFeaturePresent
LocalFree
CloseHandle
LocalAlloc
GetLastError
lstrlenW
HeapCreate
GetProcessHeap
HeapFree
GetCurrentProcess
HeapAlloc
TlsSetValue
TlsGetValue
TlsAlloc
DeleteCriticalSection
GetFileType
InitializeCriticalSectionAndSpinCount
GetCommandLineA
HeapSetInformation
GetStartupInfoW
EncodePointer
DecodePointer
RaiseException
SetUnhandledExceptionFilter
GetProcAddress
GetModuleHandleW
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameW
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
VirtualQuery
user32
RegisterClassA
MoveWindow
DestroyWindow
GetMessageA
SetTimer
ScreenToClient
GetWindowRect
PostQuitMessage
SendDlgItemMessageA
LoadBitmapA
GetParent
LoadIconA
GetWindowInfo
GetClientRect
GetUserObjectSecurity
SetFocus
SendMessageA
GetDC
IsDialogMessageA
TranslateMessage
MessageBoxA
InvalidateRect
UnregisterClassA
GetWindowLongA
GetWindowTextW
SetUserObjectSecurity
CreateWindowExA
ReleaseDC
GetDlgItem
GetDesktopWindow
SetWindowPos
DispatchMessageA
MessageBoxW
GetSystemMetrics
CloseWindow
LoadCursorA
SetDlgItemTextA
gdi32
LineTo
GetDCBrushColor
SelectObject
Ellipse
GetObjectA
GetStockObject
MoveToEx
advapi32
GetLengthSid
AddAce
AddAccessAllowedAce
InitializeAcl
GetAce
LookupPrivilegeValueA
SetSecurityDescriptorDacl
PrivilegeCheck
InitializeSecurityDescriptor
GetAclInformation
OpenProcessToken
GetSecurityDescriptorDacl
mpr
WNetOpenEnumA
WNetEnumResourceA
ws2_32
WSAStartup
WSACleanup
Sections
.text Size: 23KB - Virtual size: 22KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 26KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ