Static task
static1
Behavioral task
behavioral1
Sample
367c011d013a30c9b2f6755c4d246e45.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
367c011d013a30c9b2f6755c4d246e45.exe
Resource
win10v2004-20231215-en
General
-
Target
367c011d013a30c9b2f6755c4d246e45
-
Size
128KB
-
MD5
367c011d013a30c9b2f6755c4d246e45
-
SHA1
0e8af7542404d81383df7a43d7bb415294132ac7
-
SHA256
e2622031bc3b75194eabd484833f21634e275ababf18b96e284b10abffbd5c42
-
SHA512
81fd6b966900024a13704b45f9812f4d5e42b278ea85a64ec80901016f50078df5fa3ed8edb71e81f89255fb9178d8791976758c6e9552acd1ee6670da232c71
-
SSDEEP
3072:G0A0BD/oqE+nzq8QShbHkgnXIze/LxlctfyZlBKTN2DlFH:jDnG8QUbHkgn6ezrctcEoxFH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 367c011d013a30c9b2f6755c4d246e45
Files
-
367c011d013a30c9b2f6755c4d246e45.exe windows:4 windows x86 arch:x86
ea4344801e9d37d839bba31277ea916d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
Sleep
WideCharToMultiByte
MultiByteToWideChar
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetModuleFileNameA
InterlockedIncrement
InterlockedDecrement
InterlockedExchange
WaitForSingleObject
GetCurrentProcessId
CreateEventW
GetCurrentThread
TerminateProcess
GetSystemTimeAsFileTime
QueryPerformanceCounter
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetFilePointer
LocalAlloc
HeapReAlloc
IsBadReadPtr
IsBadWritePtr
HeapDestroy
FreeEnvironmentStringsA
SetLastError
LCMapStringA
VirtualQuery
IsDBCSLeadByte
IsBadCodePtr
GetSystemDefaultLCID
GetStringTypeA
LCMapStringW
VirtualAlloc
GetOEMCP
GetACP
GetCPInfo
RtlUnwind
VirtualFree
HeapCreate
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
ExitProcess
GetVersion
GetCommandLineA
GetStartupInfoA
GetModuleHandleA
LoadLibraryA
GetProcAddress
GetCurrentProcess
GetStringTypeW
CreateFileA
GetFileSize
GetCommandLineW
OutputDebugStringW
LocalFree
GetCurrentThreadId
lstrlenA
GetProcessHeap
HeapAlloc
HeapFree
ReadFile
WriteFile
FlushFileBuffers
DisconnectNamedPipe
CreateNamedPipeA
GetLastError
ConnectNamedPipe
OutputDebugStringA
CreateThread
GetEnvironmentStrings
CloseHandle
user32
SetCapture
InflateRect
CheckMenuItem
LoadBitmapA
DrawFocusRect
GetSysColorBrush
EnumChildWindows
SystemParametersInfoA
ScreenToClient
GetForegroundWindow
EnableMenuItem
ClientToScreen
CheckDlgButton
IsDlgButtonChecked
GetWindowLongA
PostMessageA
LoadStringA
SendMessageA
MessageBoxA
DefWindowProcA
IsWindow
GetDesktopWindow
UnregisterClassA
InvalidateRect
ReleaseDC
DispatchMessageA
SendMessageW
GetDC
EnableWindow
SetCursor
LoadCursorW
GetWindow
DestroyIcon
LoadImageW
GetSysColor
BeginPaint
EndPaint
GetParent
KillTimer
SetTimer
GetMessageW
ShowWindow
SetWindowLongW
LoadStringW
CharNextW
advapi32
AllocateAndInitializeSid
RegOpenKeyExW
RegQueryValueExA
OpenThreadToken
GetTokenInformation
RegOpenKeyExA
QueryServiceStatus
RegCreateKeyExA
RegCreateKeyW
GetSecurityDescriptorDacl
GetSidIdentifierAuthority
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegDeleteKeyA
LookupAccountSidA
IsValidSid
LsaQueryInformationPolicy
LsaFreeMemory
LsaClose
LsaOpenPolicy
RegCloseKey
shell32
CommandLineToArgvW
ole32
StringFromGUID2
StringFromCLSID
CoTaskMemRealloc
CLSIDFromString
CoCreateInstance
CoUninitialize
CreateStreamOnHGlobal
CoInitialize
Sections
.code Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 100KB - Virtual size: 2.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE