Static task
static1
Behavioral task
behavioral1
Sample
560b8dcc7c2e62d8c8e7113d9e6185d0.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
560b8dcc7c2e62d8c8e7113d9e6185d0.exe
Resource
win10v2004-20231215-en
General
-
Target
560b8dcc7c2e62d8c8e7113d9e6185d0
-
Size
98KB
-
MD5
560b8dcc7c2e62d8c8e7113d9e6185d0
-
SHA1
0393551b653546d25b107fbe95911e6352968be5
-
SHA256
656865d38fd7464b36c184e44386dbaa6a72d94277115d7c355549a92fbb02a6
-
SHA512
e7b27c37f9ad32686e0044285ebca6a05120fcd687328758b954340e68441d1ba61a2917f0adefc2ace2bf17f1edcd2fa4d8104a8a7a0af1fc2235d7e656ee59
-
SSDEEP
1536:U4mrWUHrzMsZ0nypsHGmM4SN0v6DcLXJQUB1z6bbQt+2i2u+DFzytp:UrfrzMs2y4GuwATH5ta/4zk
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 560b8dcc7c2e62d8c8e7113d9e6185d0
Files
-
560b8dcc7c2e62d8c8e7113d9e6185d0.exe windows:4 windows x86 arch:x86
f1e1e43e7697f50362aee441e478bce0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
version
VerInstallFileA
GetFileVersionInfoA
user32
MoveWindow
SetWindowLongW
EndPaint
EmptyClipboard
DestroyMenu
DrawTextA
IsZoomed
GetMenuStringA
WindowFromPoint
GetClassLongA
InsertMenuA
GetCursor
CharLowerBuffA
SystemParametersInfoA
GetWindow
RegisterClassA
GetCapture
UpdateWindow
EnumChildWindows
CreateIcon
GetMenuState
InvalidateRect
ShowWindow
CloseClipboard
GetClassNameA
OemToCharA
RegisterClipboardFormatA
LoadKeyboardLayoutA
GetWindowRect
OffsetRect
SendMessageA
GetActiveWindow
oleaut32
SafeArrayGetElement
SafeArrayGetUBound
OleLoadPicture
SysStringLen
RegisterTypeLib
GetErrorInfo
SysReAllocStringLen
SafeArrayPtrOfIndex
SysFreeString
SafeArrayUnaccessData
msvcrt
calloc
strcmp
pow
fabs
memcpy
cos
comdlg32
ChooseColorA
FindTextA
GetSaveFileNameA
GetFileTitleA
shell32
SHGetDiskFreeSpaceA
Shell_NotifyIconA
SHGetDesktopFolder
advapi32
RegCreateKeyExA
shlwapi
SHGetValueA
PathIsContentTypeA
PathGetCharTypeA
SHStrDupA
SHDeleteValueA
kernel32
LoadLibraryExA
GetVersion
GetCurrentProcess
FormatMessageA
GetCurrentThreadId
GetProcAddress
GetStringTypeA
GetSystemDefaultLangID
ReadFile
GetCurrentProcessId
FindResourceA
LocalReAlloc
GetEnvironmentStrings
VirtualAllocEx
WideCharToMultiByte
SetEndOfFile
GetCurrentThread
FreeResource
GetFullPathNameA
GetCommandLineA
SizeofResource
SetErrorMode
ExitThread
FindClose
GetUserDefaultLCID
FindFirstFileA
VirtualAlloc
GetACP
CreateFileA
Sleep
lstrcmpiA
GetLocalTime
GetStartupInfoA
CompareStringA
HeapFree
GetThreadLocale
SetThreadLocale
GetProcessHeap
HeapAlloc
SetHandleCount
LoadLibraryA
CloseHandle
SetEvent
lstrcpynA
DeleteCriticalSection
GetModuleHandleA
VirtualFree
EnterCriticalSection
Sections
CODE Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 428B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DATA Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ