Static task
static1
Behavioral task
behavioral1
Sample
f11403d3b7cb957df9fbe992dd34d99a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
f11403d3b7cb957df9fbe992dd34d99a.exe
Resource
win10v2004-20231222-en
General
-
Target
f11403d3b7cb957df9fbe992dd34d99a.exe
-
Size
368KB
-
MD5
f11403d3b7cb957df9fbe992dd34d99a
-
SHA1
df361d47336506a7e10f4ba3f7f617389b042a35
-
SHA256
77f6f3689c41cd3efb7ad256a3c6492327fe054cb24f6dc713a929d3a27997f0
-
SHA512
5efa92fa878440ec357e17597498be05c374bfe350a8153d8852d89939821930909b38e18ea81a11721ab5ba9ac102366a5f8df0059c152f53649338f1c87b9d
-
SSDEEP
6144:JpmpYNjnCyizPdOCviCpY6UAxV8NCEdqulkviOYW3SbaOKJXcZnkcBeA9B:JpLNhCKl6Fx3YZC6OYW3SGOrZnkeek
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f11403d3b7cb957df9fbe992dd34d99a.exe
Files
-
f11403d3b7cb957df9fbe992dd34d99a.exe.exe windows:4 windows x86 arch:x86
5a5619ea7e945d86241c6917d1775393
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileAttributesA
GetStartupInfoA
GetCommandLineA
ExitProcess
HeapAlloc
HeapFree
RaiseException
GetACP
HeapSize
HeapReAlloc
TerminateProcess
RtlUnwind
GetCurrentProcess
SetHandleCount
GetStdHandle
GetFileType
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
LCMapStringA
LCMapStringW
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
WaitForSingleObject
RemoveDirectoryA
lstrlenA
lstrcpyA
CreateDirectoryA
GetSystemTime
GetCPInfo
GetOEMCP
GlobalFlags
FreeLibrary
GetProcessVersion
LoadLibraryA
lstrcmpiA
lstrcatA
GlobalGetAtomNameA
GlobalDeleteAtom
GlobalAddAtomA
GlobalFindAtomA
GetModuleHandleA
GetProcAddress
FreeEnvironmentStringsW
ReadFile
CloseHandle
CreateFileA
GetCurrentThreadId
GetVersion
TlsSetValue
TlsGetValue
LocalReAlloc
GlobalLock
GlobalAlloc
GlobalReAlloc
GlobalUnlock
GlobalHandle
LocalFree
GlobalFree
TlsAlloc
LeaveCriticalSection
LocalAlloc
EnterCriticalSection
lstrcmpA
DeleteCriticalSection
InitializeCriticalSection
MultiByteToWideChar
lstrcpynA
SetLastError
InterlockedIncrement
WideCharToMultiByte
InterlockedDecrement
GetLastError
GetModuleFileNameA
CreateMutexA
DeleteFileA
GetTempPathA
GetTempFileNameA
GetEnvironmentStrings
CreateProcessA
GetEnvironmentStringsW
UnhandledExceptionFilter
FreeEnvironmentStringsA
WriteFile
user32
CopyRect
GetClientRect
AdjustWindowRectEx
SetFocus
GetSysColor
MapWindowPoints
PostMessageA
LoadIconA
SetWindowTextA
LoadCursorA
GetSysColorBrush
ReleaseDC
GetDC
GetClassNameA
PtInRect
ClientToScreen
PostQuitMessage
DestroyMenu
TabbedTextOutA
DrawTextA
GrayStringA
GetTopWindow
GetCapture
WinHelpA
GetClassInfoA
GetMenuItemCount
GetSubMenu
GetDlgItem
GetWindowTextA
GetDlgCtrlID
DefWindowProcA
CreateWindowExA
GetClassLongA
SetPropA
GetPropA
CallWindowProcA
RemovePropA
GetMessageTime
GetMessagePos
GetForegroundWindow
SetForegroundWindow
GetWindow
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetSystemMetrics
LoadBitmapA
GetMenuState
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
DispatchMessageA
GetKeyState
CallNextHookEx
PeekMessageA
SetWindowsHookExA
UnhookWindowsHookEx
GetParent
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
SendMessageA
EnableWindow
LoadStringA
CreateDialogParamA
DestroyWindow
GetMenu
RegisterClassA
GetMenuItemID
UpdateWindow
DialogBoxParamA
EndDialog
GetDlgItemTextA
MessageBoxA
wsprintfA
SetMenuItemBitmaps
ModifyMenuA
GetMenuCheckMarkDimensions
gdi32
SetBkColor
GetObjectA
SetTextColor
DeleteObject
DeleteDC
GetDeviceCaps
SaveDC
RestoreDC
GetStockObject
SelectObject
SetMapMode
SetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
OffsetViewportOrgEx
SetWindowExtEx
ScaleWindowExtEx
CreateBitmap
RectVisible
TextOutA
PtVisible
Escape
ExtTextOutA
GetClipBox
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
comctl32
ord17
Sections
.text Size: 64KB - Virtual size: 61KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ