Static task
static1
Behavioral task
behavioral1
Sample
162b14ae1bfcc6a457a8d21e6e8bff34.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
162b14ae1bfcc6a457a8d21e6e8bff34.exe
Resource
win10v2004-20231215-en
General
-
Target
162b14ae1bfcc6a457a8d21e6e8bff34.exe
-
Size
112KB
-
MD5
162b14ae1bfcc6a457a8d21e6e8bff34
-
SHA1
7b4cbb450349d24ebe7fbcc7f64b771e68ca2bd8
-
SHA256
ca83dec2b5b24d0ef1fd8b5acb4e4cf70d6c7872c2cba4527f899f6f7e14ada3
-
SHA512
3cec4ea4e7476dcc432ba96d7805e523e99a52c509758d8aa024cfecb317e0aeb1fc9ab5e1b0dfcbabbf1ee7c06a1b7589bad1232f971bbe4906a5232ae9a27a
-
SSDEEP
1536:ssL/mP4zlS7b1ucohL5UG0lNrwJ9UmyIo6ySV23Dgmkm1KSFb27flBQ:7/dz87pZ2zU+JySCDISFK7flBQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 162b14ae1bfcc6a457a8d21e6e8bff34.exe
Files
-
162b14ae1bfcc6a457a8d21e6e8bff34.exe.exe windows:4 windows x86 arch:x86
7f2967ebf2b91f35dc20b26a1992930d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
StrStrA
PathFileExistsA
ws2_32
setsockopt
kernel32
GetLocaleInfoA
InitializeCriticalSection
WideCharToMultiByte
lstrcatA
GetACP
MultiByteToWideChar
lstrlenW
RaiseException
InterlockedExchange
GetLastError
GetThreadLocale
GetProcAddress
LoadLibraryA
GetModuleFileNameA
DeleteCriticalSection
ReleaseMutex
GetVersionExA
CloseHandle
lstrcpyA
GetTickCount
GetStdHandle
DeleteTimerQueue
ResumeThread
Sleep
GetVolumeInformationA
GetVersion
lstrlenA
DeleteFileA
CreateFileA
GetFileSize
ExpandEnvironmentStringsA
WriteFile
ReadFile
lstrcmpA
WaitForSingleObject
CreateEventA
lstrcmpiA
ResetEvent
GetCurrentThreadId
GetTempPathA
TerminateThread
GetModuleHandleA
EnterCriticalSection
LeaveCriticalSection
LCMapStringW
LCMapStringA
SetEndOfFile
IsBadCodePtr
IsBadReadPtr
GetSystemInfo
GetStringTypeW
SetFileAttributesA
VirtualProtect
GetStringTypeA
FlushFileBuffers
GetCPInfo
GetOEMCP
SetStdHandle
SetUnhandledExceptionFilter
VirtualQuery
GetCurrentProcessId
HeapFree
HeapAlloc
GetSystemTimeAsFileTime
ExitProcess
TerminateProcess
GetCurrentProcess
GetStartupInfoA
GetCommandLineA
HeapReAlloc
RtlUnwind
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
HeapSize
TlsAlloc
SetLastError
TlsFree
TlsSetValue
TlsGetValue
SetHandleCount
GetFileType
SetFilePointer
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
user32
OpenIcon
IsWindow
CharToOemA
DestroyWindow
advapi32
RegOpenKeyExA
RegCloseKey
RegOpenKeyA
RegQueryValueExA
RegSetValueExA
RegSetValueA
ole32
CoCreateInstance
CoInitializeEx
CoInitialize
CoUninitialize
shell32
ShellExecuteA
CommandLineToArgvW
SHGetSpecialFolderPathA
oleaut32
SysAllocString
SysFreeString
Sections
.text Size: 80KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 896B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ