Static task
static1
Behavioral task
behavioral1
Sample
29951e105068040dddd9bfe1808979ad.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
29951e105068040dddd9bfe1808979ad.exe
Resource
win10v2004-20231222-en
General
-
Target
29951e105068040dddd9bfe1808979ad
-
Size
96KB
-
MD5
29951e105068040dddd9bfe1808979ad
-
SHA1
d77d5ae062145525bfe1aaafd16f6c9018c58821
-
SHA256
36fdc0b2bb221a1470c2b1d0973ba9bb1ebcde71e2fe4bcb2218f1e88850bdd0
-
SHA512
d1b4b58483be08530e95d23615a2c0580cb00d593c058927f2e58a9e5a7ca17e484101fd9365cc5cd4e92a3108ef301370f4eef2fbc5d024d90f0fff88395349
-
SSDEEP
1536:PpryZ0T3jWrXkILHmPFQbGdjIgaU+tdlthosLEk:PpryZSTh+adMg5QZhosQk
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 29951e105068040dddd9bfe1808979ad
Files
-
29951e105068040dddd9bfe1808979ad.exe windows:4 windows x86 arch:x86
f60bde8aabdfebfa04d02852fcd7c970
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentThreadId
MultiByteToWideChar
GetThreadPriority
GetTickCount
CreateThread
HeapAlloc
GetProcessHeap
HeapFree
SetLastError
OpenProcess
LoadLibraryA
GetProcAddress
GetModuleHandleA
GetCurrentProcessId
Process32Next
Process32First
CreateToolhelp32Snapshot
GetComputerNameA
GetSystemDefaultLCID
GetOEMCP
GetACP
GetCPInfo
CreateFileA
SetStdHandle
IsBadCodePtr
GetModuleFileNameA
GetTempPathA
FindFirstFileA
GetLastError
FindClose
GetCurrentThread
GetCurrentProcess
CloseHandle
SetErrorMode
IsBadReadPtr
LCMapStringW
SetEndOfFile
LCMapStringA
GetStringTypeW
Sleep
RtlUnwind
GetCommandLineA
GetVersion
ExitProcess
RaiseException
TerminateProcess
HeapReAlloc
HeapSize
ReadFile
SetFilePointer
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
WriteFile
FlushFileBuffers
SetUnhandledExceptionFilter
VirtualAlloc
IsBadWritePtr
GetStringTypeA
user32
GetWindowLongA
GetWindowRect
GetForegroundWindow
GetWindow
GetMessageA
GetParent
advapi32
SetServiceStatus
StartServiceA
ControlService
DeleteService
CreateServiceA
CloseServiceHandle
OpenSCManagerA
OpenProcessToken
shell32
ShellExecuteExW
oleaut32
SysAllocStringLen
SysFreeString
Sections
.text Size: 64KB - Virtual size: 63KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ