Static task
static1
Behavioral task
behavioral1
Sample
59a875a780d0b25e5fbcb8c39cef183e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
59a875a780d0b25e5fbcb8c39cef183e.exe
Resource
win10v2004-20231215-en
General
-
Target
59a875a780d0b25e5fbcb8c39cef183e
-
Size
74KB
-
MD5
59a875a780d0b25e5fbcb8c39cef183e
-
SHA1
ffec613e4f2a6e15c5bc3ac70c1e038341a3f691
-
SHA256
a3b5f5fbeb47cc4288d5d269f0530a8f6d541a3c1e14b4734c3a183839aec3d1
-
SHA512
0cc2a035a10437083b070748399356ff44eab53f9526a742a2a8286283df0269b2cf5411f4e7c3c30ce9d88d5cb68157f4b8b2b9a02ca3461768d669220dc0a8
-
SSDEEP
1536:Po6fnMer22Cbu/Jq57PJ7/8xBQn4HJFdC4NPM7utESSe1vF238E+3xv6JOp3Qmbx:Po6vMeKbu/Jq57B7/sBKwFI4NU7utESn
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 59a875a780d0b25e5fbcb8c39cef183e
Files
-
59a875a780d0b25e5fbcb8c39cef183e.exe windows:5 windows x86 arch:x86
a535282d93ca83f67a1638149224586c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
RegQueryValueExA
RegOpenKeyExA
kernel32
GetVersionExA
GetStartupInfoA
RaiseException
RtlUnwind
ExitProcess
GetModuleHandleA
GetStdHandle
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetLastError
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
TlsFree
SetLastError
GetCurrentThreadId
TlsSetValue
TlsGetValue
TlsAlloc
HeapDestroy
HeapCreate
VirtualFree
LeaveCriticalSection
EnterCriticalSection
SetUnhandledExceptionFilter
MultiByteToWideChar
GetCommandLineA
HeapSize
LoadLibraryA
GetACP
GetOEMCP
GetCPInfo
InitializeCriticalSection
VirtualAlloc
IsBadWritePtr
IsBadReadPtr
IsBadCodePtr
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
VirtualProtect
GetSystemInfo
VirtualQuery
LoadLibraryW
lstrcatW
FindResourceW
GetProcAddress
LoadResource
LockResource
FreeResource
GetVersionExW
GetSystemDirectoryW
ExpandEnvironmentStringsW
lstrcmpW
GetModuleFileNameW
GetFullPathNameW
GetSystemDefaultLangID
HeapReAlloc
CreateFileMappingW
MapViewOfFileEx
UnmapViewOfFile
lstrlenW
lstrcmpiW
GetFileSize
ReadFile
FreeLibrary
GetWindowsDirectoryW
CreateFileW
SetFilePointer
LockFile
WriteFile
UnlockFile
CloseHandle
GetProcessHeap
HeapAlloc
HeapFree
Sleep
gdi32
GetStockObject
SelectObject
CreateFontIndirectW
GetDeviceCaps
DeleteDC
DeleteObject
BitBlt
GetTextExtentPoint32W
TextOutW
SetTextAlign
SetBkMode
GetObjectW
SetBkColor
LineDDA
SetPixel
SetTextColor
ExtTextOutW
CreateCompatibleDC
CreateCompatibleBitmap
CreateSolidBrush
GetTextMetricsW
user32
EndPaint
DrawEdge
GetSysColor
BeginPaint
PostMessageW
EnableWindow
GetDlgItem
PostQuitMessage
DestroyWindow
FrameRect
MessageBeep
FillRect
GetSysColorBrush
ScreenToClient
GetWindowRect
UnregisterClassW
GetClassInfoExW
SetFocus
SetWindowPos
GetKeyState
GetDlgItemTextW
EndDialog
DialogBoxParamW
SetWindowTextA
CreateWindowExA
SendMessageA
GetWindow
GetParent
GetWindowLongW
GetDlgCtrlID
DefWindowProcW
CallWindowProcW
BringWindowToTop
IsIconic
GetClassNameW
CreateWindowExW
RegisterClassExW
LoadCursorW
SetWindowLongW
ChildWindowFromPoint
SetWindowTextW
GetClientRect
ActivateKeyboardLayout
LoadMenuW
LoadImageW
LoadIconW
GetSystemMetrics
EnumWindows
DispatchMessageW
TranslateMessage
GetMessageW
MessageBoxW
LoadStringW
RedrawWindow
SetRect
ScrollWindow
UpdateWindow
GetDC
ReleaseDC
SetScrollInfo
wsprintfW
SendMessageW
ShowWindow
InvalidateRect
comdlg32
GetSaveFileNameW
GetOpenFileNameW
imm32
ImmAssociateContext
ImmGetContext
ImmNotifyIME
ImmSetCompositionStringW
ImmGetCompositionStringW
ImmGetIMEFileNameW
Sections
.text Size: 56KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE