Static task
static1
Behavioral task
behavioral1
Sample
684ecdc064eaa32eba4ab447b3e7167c.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
684ecdc064eaa32eba4ab447b3e7167c.exe
Resource
win10v2004-20231222-en
General
-
Target
684ecdc064eaa32eba4ab447b3e7167c
-
Size
169KB
-
MD5
684ecdc064eaa32eba4ab447b3e7167c
-
SHA1
88404e65937f54a850294ffa36920362ae41e2af
-
SHA256
c183ea79949cafa56eb7704be1646b8427d4a447c566216a119ad19751daeafe
-
SHA512
ba642aa8210f309e2d2b26300d0218dcbaf683721dbe2e093602d58011598ae26b7c463d67ef903259178a5fe8c301b3ffae0113ff0c36b0da6e1ccbabdaa054
-
SSDEEP
3072:LmlwHQ9PS2uvfr/i3EipPSHP8EWjlnfs0kNhjEpzrkngGIIie:L2P82uvri0icHk5jps0kDjiFGge
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 684ecdc064eaa32eba4ab447b3e7167c
Files
-
684ecdc064eaa32eba4ab447b3e7167c.exe windows:4 windows x86 arch:x86
419042063c68b738ac019fffec1c9454
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
AdjustTokenPrivileges
ChangeServiceConfigA
DeleteService
EqualSid
GetSecurityDescriptorControl
LookupPrivilegeValueA
OpenSCManagerA
OpenServiceA
RegDeleteValueA
kernel32
CloseHandle
CopyFileA
CreateDirectoryA
CreateEventA
CreateFileA
CreateFileMappingA
CreateMutexA
CreateThread
DeleteCriticalSection
DeviceIoControl
DisableThreadLibraryCalls
EnterCriticalSection
ExitProcess
ExpandEnvironmentStringsA
FindNextFileA
FindResourceA
FreeLibrary
GetCPInfo
GetCommandLineA
GetConsoleCP
GetConsoleOutputCP
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetDriveTypeA
GetFileAttributesA
GetFileSize
GetLastError
GetLocalTime
GetLocaleInfoA
GetModuleFileNameA
GetModuleHandleA
GetOEMCP
GetPrivateProfileStructA
GetProcAddress
GetProcessHeap
GetShortPathNameA
GetStdHandle
GetStringTypeA
GetSystemDirectoryA
GetSystemTime
GetSystemTimeAsFileTime
GetTickCount
GetTimeFormatA
GetTimeZoneInformation
GlobalAlloc
GlobalHandle
GlobalLock
GlobalReAlloc
GlobalUnlock
HeapAlloc
HeapFree
InterlockedDecrement
InterlockedExchange
IsDebuggerPresent
LeaveCriticalSection
LocalAlloc
LocalFree
LockResource
MultiByteToWideChar
OpenProcess
QueryPerformanceCounter
ReadFile
ReadProcessMemory
RemoveDirectoryA
ResetEvent
SearchPathA
SetCurrentDirectoryA
SetEndOfFile
SetEnvironmentVariableA
SetFileAttributesA
SetFilePointer
SetHandleCount
SetStdHandle
SetUnhandledExceptionFilter
UnmapViewOfFile
WideCharToMultiByte
lstrcmpiA
lstrcpyA
lstrlenA
user32
ClientToScreen
CopyRect
CreatePopupMenu
EnumChildWindows
GetAsyncKeyState
GetCapture
GetDC
GetFocus
GetForegroundWindow
GetKeyState
GetMessagePos
GetParent
GetSysColorBrush
GetSystemMetrics
GetWindowDC
GetWindowThreadProcessId
IsWindowVisible
LoadBitmapA
LoadCursorA
LoadStringA
MessageBoxA
MoveWindow
PeekMessageA
SetWindowTextA
ShowWindow
SystemParametersInfoA
TranslateMessage
UpdateWindow
wsprintfA
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
Sections
.text Size: 30KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.INIT Size: 113KB - Virtual size: 232KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 15KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ