Static task
static1
Behavioral task
behavioral1
Sample
29e48c837ee60369aceeb4a6edd9c175.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
29e48c837ee60369aceeb4a6edd9c175.exe
Resource
win10v2004-20231215-en
General
-
Target
29e48c837ee60369aceeb4a6edd9c175
-
Size
46KB
-
MD5
29e48c837ee60369aceeb4a6edd9c175
-
SHA1
2c0de08bd51d4c7443601272013966c334528b9f
-
SHA256
789e9ff9bab97e47d9c02e19e579f3a18b372fff1653c4062c16c86dc186e554
-
SHA512
fee08d12491e69fe1fde0cf8b060a8eede0193a3b1e9f21f95745b11e0480061a1e3e81783838a086d3748553daa63e3fdfc809fdf10de95eec7e3cd48398469
-
SSDEEP
768:ui6/CnefTMcDQFKEUgUbcU2EBKT8VxkpP4kBRwpTHLRyb:QrFUFegUwZEC8VW2kBepTC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 29e48c837ee60369aceeb4a6edd9c175
Files
-
29e48c837ee60369aceeb4a6edd9c175.exe windows:6 windows x86 arch:x86
abf6228a414b1f86f3b25088d2feb899
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
CryptSetProvParam
ConvertSidToStringSidW
LookupAccountSidW
GetTokenInformation
DuplicateToken
OpenProcessToken
OpenThreadToken
SetUserFileEncryptionKeyEx
AddUsersToEncryptedFileEx
kernel32
WriteFile
ExpandEnvironmentStringsW
CreateThread
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentThreadId
QueryPerformanceCounter
GetModuleHandleA
SetUnhandledExceptionFilter
GetLogicalDriveStringsW
InterlockedCompareExchange
Sleep
InterlockedExchange
GetVolumeInformationW
SetErrorMode
GetDriveTypeW
GetCurrentProcessId
FindFirstFileW
FindNextFileW
FindClose
GetCurrentThread
GetCurrentProcess
LocalReAlloc
GetCurrentDirectoryW
CreateFileW
DeleteFileW
HeapSetInformation
LoadLibraryW
FreeLibrary
CloseHandle
SetCurrentDirectoryW
GetFullPathNameW
GetFileAttributesW
GetStartupInfoA
GetModuleHandleW
FileTimeToLocalFileTime
FileTimeToSystemTime
GetDateFormatW
LocalAlloc
FormatMessageW
UnhandledExceptionFilter
GetLastError
LocalFree
GetTickCount
user32
SendDlgItemMessageW
MessageBoxExW
LoadCursorW
GetParent
PostMessageW
SetFocus
IsWindow
GetFocus
GetDlgItemTextW
ScreenToClient
GetMessagePos
InvalidateRect
DestroyIcon
MessageBoxW
SendMessageW
LoadStringW
EnableWindow
SetWindowLongW
GetDlgItem
SetDlgItemTextW
SetCursor
LoadIconW
ShowWindow
msvcrt
_cexit
_XcptFilter
_ismbblead
exit
memcpy
_initterm
_amsg_exit
_adjust_fdiv
__p__commode
__p__fmode
_wcsicmp
_vsnwprintf
_acmdln
memset
__getmainargs
_controlfp
_except_handler4_common
?terminate@@YAXXZ
_exit
__set_app_type
__setusermatherr
ntdll
NtQueryInformationFile
RtlFreeHeap
RtlRandomEx
RtlAllocateHeap
netapi32
DsRoleGetPrimaryDomainInformation
DsRoleFreeMemory
rpcrt4
RpcStringFreeW
UuidToStringW
UuidCreate
winscard
SCardFreeMemory
SCardListCardsW
SCardGetCardTypeProviderNameW
crypt32
CertDuplicateCertificateContext
CertEnumCertificatesInStore
CertOpenStore
CertCloseStore
CertGetCertificateContextProperty
CertFreeCertificateContext
CertSetCertificateContextProperty
CertGetNameStringW
cryptui
CryptUIDlgSelectCertificateW
CryptUIWizExport
CryptUIDlgViewCertificateW
comctl32
ord345
PropertySheetW
comdlg32
CommDlgExtendedError
GetSaveFileNameW
ole32
CoCreateInstance
CoInitialize
CoUninitialize
shell32
SHGetFolderPathW
ShellExecuteW
efsadu
EfsUIUtilPromptForPinDialog
EfsUIUtilCheckScardStatus
EfsUIUtilEnrollEfsCertificate
feclient
EfsUtilGetCertContextFromCertHash
EfsUtilGetCurrentKey
EfsUtilCheckCurrentKeyCapabilities
EfsApplyLastPolicy
EfsInitPolicyLibrary
EfsUtilCreateSelfSignedCertificate
slc
SLGetWindowsInformationDWORD
mpr
WNetGetResourceInformationW
WNetGetProviderNameW
oleaut32
SysFreeString
SysAllocString
Sections
.text Size: 31KB - Virtual size: 30KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE