Static task
static1
Behavioral task
behavioral1
Sample
653cd94295b9e94cdea36d05ddd56f79.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
653cd94295b9e94cdea36d05ddd56f79.exe
Resource
win10v2004-20231215-en
General
-
Target
653cd94295b9e94cdea36d05ddd56f79
-
Size
324KB
-
MD5
653cd94295b9e94cdea36d05ddd56f79
-
SHA1
4bc43fcba6973f1d1022e74abaf11cdce32702fb
-
SHA256
1ff6ec4569dae5ade9a681631ff25ed0b0c727ea279697a33517e6176ac47290
-
SHA512
9c7af5e9679c66b3ba563c2c6c44d110dde454c8d971bdca822eed47ed1ba57124ec8ff590e11cd359629ed0d5d370845780a6c40bd052f7750e352a92c5c283
-
SSDEEP
6144:WaVOxHJWOwAWPI1gLEcc/MGxOb1sVHUr7Rr9cbocX5Tn:OxHECWI1H/MDuVHaRr2H
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 653cd94295b9e94cdea36d05ddd56f79
Files
-
653cd94295b9e94cdea36d05ddd56f79.exe windows:4 windows x86 arch:x86
9b45eaa25f29b297a801a96eb691e87a
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleW
GetPrivateProfileIntW
GetPrivateProfileSectionW
GetPrivateProfileStringA
GetPrivateProfileStringW
GetProcAddress
GetProcessHeap
GetSystemDefaultUILanguage
GetSystemDirectoryW
GetSystemInfo
GetSystemTimeAsFileTime
GetTickCount
GetUserDefaultUILanguage
GetVersion
GetVersionExA
GetVersionExW
GetWindowsDirectoryW
GlobalFree
HeapAlloc
HeapFree
InitializeCriticalSectionAndSpinCount
InterlockedCompareExchange
InterlockedDecrement
InterlockedExchange
IsDBCSLeadByte
LeaveCriticalSection
LoadLibraryA
LoadLibraryExW
LoadLibraryW
LoadResource
LocalFree
GetModuleFileNameW
LockResource
MapViewOfFile
MoveFileExW
MoveFileW
MultiByteToWideChar
OpenEventW
OutputDebugStringA
OutputDebugStringW
QueryPerformanceCounter
ReadFile
RemoveDirectoryW
ResumeThread
RtlUnwind
SearchPathW
SetFileAttributesW
SetFilePointer
SetLastError
SetUnhandledExceptionFilter
SizeofResource
Sleep
TerminateProcess
UnhandledExceptionFilter
UnmapViewOfFile
WaitForSingleObject
WideCharToMultiByte
WriteFile
WritePrivateProfileStringW
lstrcmpW
lstrcmpiA
lstrlenA
lstrlenW
GetLocaleInfoW
GetLocalTime
GetLastError
GetFileSize
GetFileAttributesW
GetFileAttributesExW
GetExitCodeThread
GetCurrentThreadId
GetCurrentProcessId
GetCurrentProcess
GetComputerNameW
FreeLibrary
FlushFileBuffers
FindResourceW
FindResourceExW
FindNextFileW
FindFirstFileW
FindClose
FileTimeToSystemTime
ExpandEnvironmentStringsW
EnumUILanguagesW
EnterCriticalSection
DisableThreadLibraryCalls
DeleteFileW
DeleteCriticalSection
CreateThread
CreateFileW
CreateFileMappingW
CreateDirectoryW
CopyFileW
CompareStringW
CompareStringA
LocalReAlloc
CloseHandle
user32
MsgWaitForMultipleObjects
PeekMessageW
PostMessageW
SendDlgItemMessageW
SendMessageTimeoutW
SetCursor
SetTimer
TranslateMessage
LoadStringW
LoadImageW
KillTimer
GetWindow
GetTopWindow
GetSystemMetrics
GetMessageW
GetClassNameA
EndDialog
DispatchMessageW
DialogBoxParamW
DestroyIcon
CharNextW
CharLowerW
LoadCursorW
advapi32
RegOpenKeyExW
EnumServicesStatusExW
DuplicateTokenEx
CreateProcessAsUserW
CopySid
ConvertStringSidToSidW
CloseServiceHandle
AllocateAndInitializeSid
AdjustTokenPrivileges
RegQueryInfoKeyW
RegQueryValueExA
RegQueryValueExW
RegSaveKeyW
RegSetValueExW
RevertToSelf
SetFileSecurityW
SetSecurityDescriptorOwner
GetLengthSid
GetTokenInformation
ImpersonateLoggedOnUser
InitializeSecurityDescriptor
LookupPrivilegeNameW
LookupPrivilegeValueW
OpenProcessToken
OpenSCManagerW
RegCloseKey
RegCreateKeyExW
RegDeleteValueW
RegEnumKeyExW
RegEnumKeyW
RegEnumValueW
RegOpenKeyExA
FreeSid
shlwapi
StrTrimW
StrToIntW
StrToIntExW
StrStrW
ChrCmpIA
PathAddBackslashW
PathAddExtensionW
PathAppendW
PathCombineW
PathFileExistsW
PathFindExtensionW
PathFindFileNameW
PathFindNextComponentW
PathGetCharTypeW
PathGetDriveNumberW
PathIsDirectoryW
PathIsFileSpecW
PathIsPrefixW
PathIsRootW
PathIsUNCServerW
PathIsURLW
PathRemoveBackslashW
PathRemoveBlanksW
PathRemoveExtensionW
PathRemoveFileSpecW
PathRenameExtensionW
PathSkipRootW
PathUnquoteSpacesW
SHDeleteEmptyKeyW
SHDeleteKeyW
SHDeleteValueW
SHGetValueW
StrStrIW
SHSetValueW
StrChrIW
StrChrW
StrCmpIW
StrCmpNIW
StrCmpNW
StrCmpW
StrDupW
StrRChrW
StrRetToStrW
StrSpnW
SHQueryValueExW
ole32
StringFromGUID2
CreateBindCtx
CoUninitialize
CoTaskMemRealloc
CoTaskMemFree
CoTaskMemAlloc
CoInitializeEx
CoCreateInstance
CoCreateGuid
oleaut32
VariantInit
SysStringByteLen
VariantCopy
VariantClear
VariantChangeType
SysStringLen
SafeArrayAccessData
SafeArrayCreate
SafeArrayDestroy
SafeArrayPutElement
SafeArrayUnaccessData
SysAllocString
SysAllocStringByteLen
SysFreeString
shell32
SHGetDesktopFolder
ShellExecuteExW
SHChangeNotify
setupapi
SetupCloseInfFile
SetupFindFirstLineW
SetupFindNextLine
SetupGetBinaryField
SetupGetIntField
SetupGetLineTextW
SetupGetStringFieldW
SetupOpenInfFileW
Sections
.text Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 112KB - Virtual size: 112KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 112KB - Virtual size: 1.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ