?ForceTriangulateA@@YGKDDPAX:O
Static task
static1
Behavioral task
behavioral1
Sample
268815e4ba6b850f20748f875fc1a979.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
268815e4ba6b850f20748f875fc1a979.exe
Resource
win10v2004-20231215-en
General
-
Target
268815e4ba6b850f20748f875fc1a979
-
Size
136KB
-
MD5
268815e4ba6b850f20748f875fc1a979
-
SHA1
540b498968ee53cdd5f85ba4c62336f3f1e2059a
-
SHA256
829ddd649b37942db6b9569ad1df2c48bc90dcae9de7f3999722046590a7bace
-
SHA512
aba154485cce7220ed32b6002e282d9d566b0f0a2bf7d1e18a41837482b5e57f477c1b78a59ef2718f67f33ece8d326e0a67a778d409e9a3f492334c302e4e82
-
SSDEEP
3072:3iOvwQqm2DfftCvOp5NkVD+Kpv3uTrTouukPRvutAhF5:5omIkvOzOd+4v+TWQR2tAZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 268815e4ba6b850f20748f875fc1a979
Files
-
268815e4ba6b850f20748f875fc1a979.exe windows:5 windows x86 arch:x86
352c9eccc3368b6b19bd1a2dc40204fb
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalFlags
GetAtomNameA
FindResourceExA
SetEndOfFile
LoadLibraryW
MoveFileExW
LoadResource
GetNumberFormatA
GlobalFree
GetVersionExA
SetCommTimeouts
FindResourceA
GetLongPathNameW
GetWindowsDirectoryA
lstrcpynA
GlobalFindAtomW
IsBadCodePtr
CreateSemaphoreW
CreateNamedPipeA
GlobalGetAtomNameA
FindNextFileA
InitializeCriticalSection
lstrlenA
FlushFileBuffers
CompareStringA
HeapWalk
HeapSize
TlsFree
GetFileTime
GetCurrentThread
CreateDirectoryA
FindFirstFileW
GetCommConfig
CallNamedPipeW
GetCompressedFileSizeW
HeapCreate
GetOverlappedResult
CompareStringW
ExitThread
GetFileAttributesExA
LocalSize
CreateFileA
GlobalLock
GetModuleFileNameA
GetSystemDirectoryA
SetWaitableTimer
GlobalHandle
SetThreadAffinityMask
GlobalAlloc
GetShortPathNameA
CreatePipe
GlobalAddAtomA
HeapReAlloc
lstrcpynW
GlobalReAlloc
user32
DrawTextW
RegisterClassW
CopyAcceleratorTableW
LockWindowUpdate
MonitorFromRect
GetWindowDC
AdjustWindowRect
PostQuitMessage
IsWindowVisible
GetNextDlgGroupItem
LoadImageA
FillRect
GetLastActivePopup
AllowSetForegroundWindow
MapVirtualKeyA
OffsetRect
GetMenuItemCount
LoadMenuW
CharNextW
GetDlgItemTextA
GetWindow
SetMenuItemBitmaps
DrawFocusRect
ClipCursor
IsCharAlphaA
DrawAnimatedRects
RemovePropW
CharUpperA
WaitForInputIdle
MapWindowPoints
OemToCharBuffA
IsCharUpperA
DestroyAcceleratorTable
ValidateRect
MoveWindow
GetKeyNameTextW
DrawEdge
IsDialogMessageA
ChildWindowFromPoint
GetScrollInfo
SetParent
DispatchMessageW
SetWindowLongW
CharUpperBuffA
IsCharLowerA
DefDlgProcA
GetSystemMenu
GetMenuStringA
GetForegroundWindow
TrackPopupMenuEx
DefFrameProcA
DrawStateA
CreateWindowExA
EnumWindows
FindWindowExW
GetSysColor
ReplyMessage
GetUpdateRgn
OpenDesktopW
SetRect
TrackPopupMenu
InvertRect
ToUnicodeEx
PostMessageA
GetKeyboardLayout
IsCharAlphaW
CharToOemA
DragObject
GetScrollPos
ReleaseDC
LoadIconW
TileWindows
FindWindowA
HideCaret
RegisterWindowMessageA
DestroyCaret
CheckRadioButton
SetDlgItemTextA
GetScrollRange
MessageBoxW
SetWindowTextA
KillTimer
DefWindowProcW
FindWindowW
DrawFrameControl
VkKeyScanA
PeekMessageA
CharPrevA
GetFocus
wsprintfA
CreateIconIndirect
GetAsyncKeyState
GetActiveWindow
UpdateWindow
EndPaint
DialogBoxIndirectParamA
SetLastErrorEx
CallWindowProcW
PostMessageW
SetWindowTextW
GetMessageExtraInfo
GetSystemMetrics
GetMessageA
CloseDesktop
wvsprintfA
CallWindowProcA
CreateDialogParamA
CreateDialogIndirectParamW
SetCaretPos
DrawMenuBar
PostThreadMessageA
GetClassLongW
GetDCEx
SetFocus
InvalidateRgn
CreateCaret
GetDlgItem
EndDialog
SetWindowRgn
SetScrollPos
ChildWindowFromPointEx
DestroyWindow
GetMenuItemRect
SetClassLongW
msvcrt
isalpha
memset
_controlfp
putchar
__set_app_type
fgets
isupper
calloc
__p__fmode
__p__commode
fprintf
isspace
fputs
wcscmp
realloc
gmtime
wcsstr
strtoul
_amsg_exit
towupper
fputc
strerror
iswprint
puts
strcspn
wcsncpy
localtime
_initterm
free
_ismbblead
sprintf
wcscspn
_XcptFilter
time
wcschr
_exit
wcstok
sscanf
wcscat
swprintf
fgetc
_cexit
__setusermatherr
vswprintf
setvbuf
wcscoll
exit
__getmainargs
Exports
Exports
Sections
.text Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.align Size: 1KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.date Size: 512B - Virtual size: 93B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.dati Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.char Size: 512B - Virtual size: 297B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.odata Size: 512B - Virtual size: 192B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 100KB - Virtual size: 99KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ