Static task
static1
Behavioral task
behavioral1
Sample
244768a44166c7fba5fadb964cd3a06b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
244768a44166c7fba5fadb964cd3a06b.exe
Resource
win10v2004-20231215-en
General
-
Target
244768a44166c7fba5fadb964cd3a06b
-
Size
231KB
-
MD5
244768a44166c7fba5fadb964cd3a06b
-
SHA1
b89401d4db29806dbde38fb936591eca7df0fa68
-
SHA256
e47038b00fbe826ce2c33946caf3ad7e4c7873518345b0607af644ee98c5eb34
-
SHA512
93eb01f4e6425c14a1e5c9a332e27624f4d1938cf37d66c12880dbf99bc0d815097e162bd6a541bd71b7b1924876d4adc2b621253fcbaaeb9baabff434c5e392
-
SSDEEP
6144:udkzyL3keSTR/G0aTBq/EnpsJHninW358L35:ugyL3k9pG5Ts/jhninW35A
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 244768a44166c7fba5fadb964cd3a06b
Files
-
244768a44166c7fba5fadb964cd3a06b.exe windows:4 windows x86 arch:x86
29b6f4410baa6a961348221e0d226c95
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
version
VerQueryValueA
kernel32
GetWindowsDirectoryA
MoveFileExA
LocalAlloc
lstrlenA
FormatMessageA
SizeofResource
LockResource
LoadResource
FindResourceA
GetModuleHandleA
DeleteFileA
WritePrivateProfileStringA
CloseHandle
GetTickCount
WaitForMultipleObjects
FreeLibrary
GetProcAddress
LoadLibraryA
GetTempFileNameA
GetTempPathA
CreateEventA
OpenProcess
GetCurrentProcessId
GetModuleFileNameA
GetLastError
GetVersionExA
LocalFree
Sleep
UnmapViewOfFile
GetComputerNameA
MapViewOfFile
CreateFileMappingA
Process32Next
Process32First
CreateToolhelp32Snapshot
WriteFile
SetFilePointer
CreateFileA
GetLocalTime
GetSystemTimeAsFileTime
InterlockedIncrement
InterlockedDecrement
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
WideCharToMultiByte
InterlockedExchange
HeapFree
RtlUnwind
RaiseException
GetStartupInfoA
GetCommandLineA
ExitProcess
GetTimeFormatA
GetDateFormatA
HeapAlloc
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetCPInfo
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
IsBadWritePtr
TlsAlloc
SetLastError
GetCurrentThreadId
TlsFree
TlsSetValue
TlsGetValue
SetUnhandledExceptionFilter
FlushFileBuffers
TerminateProcess
GetCurrentProcess
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
VirtualQuery
GetTimeZoneInformation
VirtualProtect
GetSystemInfo
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
HeapSize
IsBadReadPtr
IsBadCodePtr
GetACP
GetOEMCP
SetStdHandle
ReadFile
GetLocaleInfoW
SetEndOfFile
CompareStringA
CompareStringW
SetEnvironmentVariableA
user32
SetWindowsHookExA
UnhookWindowsHookEx
wsprintfA
advapi32
InitializeAcl
RegOpenKeyExA
RegSetValueExA
SetSecurityInfo
RegCloseKey
Sections
.text Size: 104KB - Virtual size: 103KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 84KB - Virtual size: 81KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ