_Start@12
Static task
static1
Behavioral task
behavioral1
Sample
12c2a6d5dfc50828d1773af4e10ec81bf13e24dded20ef8fabbbcd9d926173b6.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
12c2a6d5dfc50828d1773af4e10ec81bf13e24dded20ef8fabbbcd9d926173b6.exe
Resource
win10v2004-20231215-en
General
-
Target
12c2a6d5dfc50828d1773af4e10ec81bf13e24dded20ef8fabbbcd9d926173b6
-
Size
2.2MB
-
MD5
83c45d7624f969ca04b7e475f1152257
-
SHA1
b02e16b66016b3908742d81afce4dbe300328ba4
-
SHA256
12c2a6d5dfc50828d1773af4e10ec81bf13e24dded20ef8fabbbcd9d926173b6
-
SHA512
2698d37a0d024534ae74d46c11f6206fa2f116f2fc420ff0a5bc4235a7b05ad39934f85a4ed83342a0d754e494bb92ded4d52192875f62dc20ca17ef0bed88da
-
SSDEEP
49152:F1YLwJdw32NjOsKj82vn0IGL0E2E6GFVfoPRNJ4:zYQwmludQ9C2ENJ4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 12c2a6d5dfc50828d1773af4e10ec81bf13e24dded20ef8fabbbcd9d926173b6
Files
-
12c2a6d5dfc50828d1773af4e10ec81bf13e24dded20ef8fabbbcd9d926173b6.exe windows:5 windows x86 arch:x86
3cfc9f14a5728bf9f8069a97591e22e1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapDestroy
HeapAlloc
HeapReAlloc
HeapFree
HeapSize
GetProcessHeap
SetFilePointer
CloseHandle
MapViewOfFile
UnmapViewOfFile
CreateFileMappingW
CreateFileW
GetFileAttributesExW
GetLongPathNameW
OpenProcess
GetCurrentProcessId
GetLastError
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
CreateMutexW
GetModuleFileNameW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
RaiseException
GetCurrentThreadId
SetLastError
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
MultiByteToWideChar
LockResource
FreeLibrary
SetEvent
WaitForSingleObject
WaitForMultipleObjects
LoadResource
SizeofResource
CreateEventW
FindResourceW
FindResourceExW
GetVersionExW
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
MulDiv
GetProcAddress
GetCurrentProcess
TerminateProcess
GetExitCodeProcess
LoadLibraryW
GetModuleHandleW
WideCharToMultiByte
LockFile
UnlockFile
GetFileSize
ReadFile
DecodePointer
InterlockedIncrement
InterlockedDecrement
lstrcmpiW
LoadLibraryExW
DeleteFileW
MoveFileExW
LocalFree
FindClose
lstrlenW
RemoveDirectoryW
GetFullPathNameW
SetFileAttributesW
GetFileAttributesW
FindFirstFileW
FindNextFileW
WriteFile
GetLogicalDriveStringsW
GetDriveTypeW
GetTempPathW
GetDiskFreeSpaceExW
GetTempFileNameW
Sleep
GetTickCount
WaitForSingleObjectEx
OutputDebugStringA
SetEnvironmentVariableW
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindNextFileA
FindFirstFileExW
FindFirstFileExA
ReadConsoleW
SetEndOfFile
SetStdHandle
SetConsoleCtrlHandler
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetTimeFormatW
GetDateFormatW
WriteConsoleW
GetACP
GetStdHandle
GetModuleFileNameA
ExitProcess
GetTimeZoneInformation
GetConsoleMode
GetConsoleCP
SetFilePointerEx
GetFileType
GetModuleHandleExW
FreeLibraryAndExitThread
ExitThread
CreateThread
InterlockedFlushSList
RtlUnwind
CreateFileA
lstrcmpiA
ResetEvent
lstrcmpA
DeviceIoControl
GetSystemWindowsDirectoryW
FreeResource
InterlockedCompareExchange
GetThreadSelectorEntry
ResumeThread
SuspendThread
GetThreadContext
GetThreadPriority
SetThreadPriority
OpenThread
GetCurrentThread
GetWindowsDirectoryW
GetSystemDirectoryW
FlushFileBuffers
QueryPerformanceCounter
GetStartupInfoW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
ReleaseMutex
GetCPInfo
GetLocaleInfoW
LCMapStringW
CompareStringW
GetSystemTimeAsFileTime
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
GetSystemInfo
VirtualProtect
VirtualQuery
LoadLibraryExA
IsDebuggerPresent
OutputDebugStringW
EncodePointer
InitializeSListHead
InterlockedPopEntrySList
InterlockedPushEntrySList
FlushInstructionCache
IsProcessorFeaturePresent
VirtualAlloc
VirtualFree
GetFileSizeEx
GetStringTypeW
FormatMessageW
SwitchToThread
user32
LoadImageW
SetWindowTextW
GetSystemMetrics
MoveWindow
PostQuitMessage
CharNextW
PeekMessageW
DispatchMessageW
TranslateMessage
GetMessageW
GetShellWindow
SystemParametersInfoW
SetWindowRgn
IsWindowVisible
UpdateLayeredWindow
RegisterWindowMessageW
ShowWindow
GetMonitorInfoW
MonitorFromWindow
IsDialogMessageW
GetWindow
GetParent
MapWindowPoints
GetWindowRect
EndDialog
DialogBoxParamW
BringWindowToTop
SetWindowPos
IsRectEmpty
RedrawWindow
SetCursor
CopyRect
PtInRect
OffsetRect
SetRect
IsWindow
ReleaseDC
GetDC
KillTimer
SetTimer
GetClientRect
GetWindowTextLengthW
GetWindowTextW
InvalidateRect
EndPaint
BeginPaint
DrawTextW
LoadCursorW
SetWindowLongW
GetWindowLongW
DestroyWindow
CreateWindowExW
GetClassInfoExW
RegisterClassExW
UnregisterClassW
CallWindowProcW
DefWindowProcW
PostMessageW
SendMessageW
GetWindowThreadProcessId
FindWindowExW
wsprintfW
FindWindowW
UnregisterClassA
DrawFocusRect
ScreenToClient
oleaut32
SysFreeString
SysAllocString
VariantClear
VarUI4FromStr
VariantInit
Exports
Exports
Sections
.text Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 211KB - Virtual size: 211KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 173KB - Virtual size: 185KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 876KB - Virtual size: 876KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 57KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ