Static task
static1
Behavioral task
behavioral1
Sample
412710c07f3c5021458a0bdc04f44089.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
412710c07f3c5021458a0bdc04f44089.exe
Resource
win10v2004-20231215-en
General
-
Target
412710c07f3c5021458a0bdc04f44089
-
Size
108KB
-
MD5
412710c07f3c5021458a0bdc04f44089
-
SHA1
6ffa514266d6965076d3024a775dc99ffc571dd2
-
SHA256
7df41ae678b1f6aab29a342b8efd07e4ba4dde8cf6befbd55fcbb1bf958fd8a4
-
SHA512
836c07f470310bc795a7d7e4225eeb5ea22927d3e7d1af863141b97bf5478d22afa755889693ac2b36becfc9333d0de1b8993fccf9f5cae18cf5dc03a87e4b00
-
SSDEEP
1536:PJAIrlOjz/uFwdYLRndw1x1zJYR9uVsM2p9u/gczCXNVWx4YBtJI5lAP3:TY/9y2x1zJ4esMSBXLWxbbITAP3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 412710c07f3c5021458a0bdc04f44089
Files
-
412710c07f3c5021458a0bdc04f44089.exe windows:4 windows x86 arch:x86
93b312a8f67dbe99fc69277267562401
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileA
ExitThread
FindClose
FormatMessageA
GetCommandLineA
GetConsoleMode
GetCurrentProcess
GetCurrentThread
GetCurrentThreadId
GetFileTime
GetFullPathNameA
GetLastError
GetModuleFileNameA
GetPrivateProfileStructA
GetProcessHeap
GetStdHandle
GetTickCount
GlobalHandle
GlobalUnlock
HeapDestroy
HeapReAlloc
IsBadCodePtr
IsValidCodePage
LockResource
MapViewOfFile
MoveFileA
MultiByteToWideChar
OutputDebugStringA
ReleaseMutex
ResetEvent
SetEvent
Sleep
SystemTimeToFileTime
TlsGetValue
TlsSetValue
UnmapViewOfFile
VirtualFree
lstrcmpA
lstrcmpiA
user32
CallWindowProcA
CharNextA
CharUpperA
CheckMenuItem
CreateDialogParamA
CreateWindowExA
DefWindowProcA
DestroyIcon
DialogBoxParamA
EnableMenuItem
EndDialog
GetParent
GetSubMenu
GetSysColorBrush
GetWindowLongA
InflateRect
InvalidateRect
IsWindowEnabled
LoadStringA
PeekMessageA
PostMessageA
ScreenToClient
SendMessageA
SetCursor
SetDlgItemTextA
SetRect
SetWindowTextA
ShowWindow
WinHelpA
advapi32
ChangeServiceConfig2A
ChangeServiceConfigA
CloseServiceHandle
CreateServiceA
DeleteService
FreeSid
GetSecurityDescriptorControl
GetTokenInformation
InitializeSecurityDescriptor
LockServiceDatabase
LookupAccountSidA
LookupPrivilegeValueA
OpenProcessToken
OpenSCManagerA
RegCloseKey
RegCreateKeyExA
RegDeleteKeyA
RegOpenKeyA
RegOpenKeyExA
RegQueryInfoKeyA
RegQueryValueA
RegisterServiceCtrlHandlerA
SetSecurityDescriptorDacl
SetServiceStatus
StartServiceA
StartServiceCtrlDispatcherA
UnlockServiceDatabase
Sections
.text Size: 92KB - Virtual size: 91KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data1 Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 912B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ