Static task
static1
Behavioral task
behavioral1
Sample
28fc83a21be4e25d4dad30b71238e6b7.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
28fc83a21be4e25d4dad30b71238e6b7.exe
Resource
win10v2004-20231215-en
General
-
Target
28fc83a21be4e25d4dad30b71238e6b7
-
Size
540KB
-
MD5
28fc83a21be4e25d4dad30b71238e6b7
-
SHA1
8452d9446d3c07a5ab0c474d4fc778b8b4121cb0
-
SHA256
7ae2cc7f04fa6992c13b2475e62247961767a7deeaf6f973e6fe187f708bea80
-
SHA512
934a3fb642b28d72e6d4a2791cf3bfab4560ba7200ab8e297e6109f44b01da5c1e3291b9c53fa41ee3a894e655320dcae62445a4354e730352bf6b696fa26368
-
SSDEEP
12288:JFq3h7UY/eaNgvVIWB0VN/UdiRCBEK90h+5y+g:JFq3h7UIne6fZGim0wUJ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 28fc83a21be4e25d4dad30b71238e6b7
Files
-
28fc83a21be4e25d4dad30b71238e6b7.exe windows:4 windows x86 arch:x86
4d3ae1135055ef89f7391e3982e03763
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetClipboardViewer
LoadStringA
SetWindowPos
LoadImageA
ScrollDC
DefWindowProcA
GetCursor
SetSysColors
GetQueueStatus
FindWindowExA
GetDlgItemTextW
RegisterClassExA
OpenDesktopA
DialogBoxIndirectParamW
DlgDirSelectComboBoxExW
UnpackDDElParam
CreateDialogParamW
LoadMenuW
DragObject
ShowCursor
EnableMenuItem
CloseWindowStation
RegisterClassW
DdePostAdvise
DestroyWindow
CreateWindowExW
MessageBoxW
RegisterClassA
InsertMenuItemW
GetWindow
IsChild
PostThreadMessageA
ShowWindow
CopyImage
GetClipboardFormatNameA
EnumThreadWindows
IsCharAlphaW
GetKeyboardState
comctl32
ImageList_GetFlags
DrawStatusText
ImageList_LoadImageW
ImageList_GetImageInfo
CreatePropertySheetPageW
ImageList_Read
ImageList_BeginDrag
DestroyPropertySheetPage
ImageList_EndDrag
_TrackMouseEvent
DrawStatusTextW
InitCommonControlsEx
CreateStatusWindowW
ImageList_DragEnter
ImageList_GetImageCount
ImageList_GetIconSize
CreatePropertySheetPage
ImageList_ReplaceIcon
ImageList_Remove
ImageList_LoadImage
ImageList_SetImageCount
ImageList_LoadImageA
ImageList_SetFlags
kernel32
GetVersion
GetFileType
HeapFree
LeaveCriticalSection
CompareStringW
GetModuleFileNameA
GetProcAddress
GetStringTypeA
HeapDestroy
InitializeCriticalSection
WideCharToMultiByte
FreeEnvironmentStringsA
InterlockedDecrement
GlobalUnlock
RtlUnwind
SetFilePointer
GetTickCount
GetStringTypeW
ExitProcess
GetSystemTimeAdjustment
QueryPerformanceCounter
SetLocaleInfoW
TlsSetValue
SetEnvironmentVariableA
HeapAlloc
GetOEMCP
SetLastError
GetStdHandle
GetTimeZoneInformation
DeleteCriticalSection
FlushFileBuffers
LCMapStringA
VirtualFree
GetStringTypeExA
CompareStringA
GetCurrentThread
GetCommandLineA
GetStartupInfoA
LocalSize
GetSystemTimeAsFileTime
LCMapStringW
CloseHandle
MultiByteToWideChar
HeapReAlloc
VirtualQuery
CreateMutexA
UnhandledExceptionFilter
GetCPInfo
InterlockedIncrement
TlsAlloc
GetLastError
InterlockedExchange
GetCurrentThreadId
FreeEnvironmentStringsW
GetACP
OpenMutexA
WriteFile
EnterCriticalSection
GetLocalTime
GetCurrentProcess
ReadFile
SetHandleCount
HeapCreate
GetModuleHandleA
GetSystemTime
SetStdHandle
TlsFree
GetEnvironmentStringsW
VirtualAlloc
GetCurrentProcessId
GetNamedPipeHandleStateW
TlsGetValue
CreateEventW
LoadLibraryA
GetEnvironmentStrings
GetPrivateProfileSectionW
IsBadWritePtr
CreateRemoteThread
TerminateProcess
Sections
.text Size: 160KB - Virtual size: 159KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 236KB - Virtual size: 233KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 120KB - Virtual size: 136KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ