Static task
static1
Behavioral task
behavioral1
Sample
716e1c009e09203b8ce12c0dcccc872f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
716e1c009e09203b8ce12c0dcccc872f.exe
Resource
win10v2004-20231215-en
General
-
Target
716e1c009e09203b8ce12c0dcccc872f
-
Size
139KB
-
MD5
716e1c009e09203b8ce12c0dcccc872f
-
SHA1
cae534e22c7a0fc854d7c587acf3551bc7b7e1ae
-
SHA256
57da09fc07363e4258fe9db8420fedcb7d473e2e6a132d65b2b2f8b2104a4eb3
-
SHA512
e8285c54e120cc429d2e5f4552f1fbd2cc695ca83c98c57743c02c695caba6f4b91cf44a3cc5b31022cfb279f46a0267c8f2ccdf304f373d737c7b14b6ea2b7a
-
SSDEEP
1536:rd08pKA7VfMX6GtuvezcngDkY02WUvH1h8nW/+3ZDoioifWowyXW65ZgU:TJj+U8cpJ2gWKZdoje5ZgU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 716e1c009e09203b8ce12c0dcccc872f
Files
-
716e1c009e09203b8ce12c0dcccc872f.exe windows:5 windows x86 arch:x86
bd2f580f5ff3076a5561cd1c8ad4feec
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
wininet
InternetReadFile
InternetOpenA
InternetOpenUrlA
InternetCloseHandle
kernel32
CreateToolhelp32Snapshot
CloseHandle
ExitProcess
SetPriorityClass
MoveFileExA
GetCurrentProcess
GetCurrentThread
SetProcessPriorityBoost
GetFileAttributesA
GetEnvironmentVariableA
SetThreadPriority
GetShortPathNameA
GetProcAddress
LoadLibraryA
GetModuleHandleA
GetVersionExA
GetLastError
CreateMutexA
ReleaseMutex
GetCurrentProcessId
FreeLibrary
GetModuleFileNameA
WaitForSingleObject
GetTickCount
CreateEventA
MultiByteToWideChar
CreateThread
SetStdHandle
GetConsoleMode
GetConsoleCP
SetFilePointer
InitializeCriticalSectionAndSpinCount
SetEnvironmentVariableA
CompareStringW
CompareStringA
GetLocaleInfoA
HeapSize
Process32Next
Sleep
Process32First
GetComputerNameA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
WinExec
WideCharToMultiByte
GetStringTypeW
GetStringTypeA
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetFileType
SetHandleCount
FlushFileBuffers
InterlockedIncrement
InterlockedDecrement
InterlockedExchange
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapFree
HeapAlloc
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCommandLineA
GetStartupInfoA
RaiseException
RtlUnwind
GetCPInfo
LCMapStringA
LCMapStringW
GetACP
GetOEMCP
IsValidCodePage
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
WriteFile
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
user32
IsWindow
SwitchToThisWindow
RealGetWindowClassA
VkKeyScanW
SendInput
MapVirtualKeyA
PostMessageA
BlockInput
keybd_event
FindWindowExA
SendMessageA
GetForegroundWindow
GetWindowTextA
FindWindowA
advapi32
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
FreeSid
AllocateAndInitializeSid
GetUserNameA
RegOpenKeyExA
RegQueryValueExA
IsTextUnicode
shell32
ShellExecuteExA
ShellExecuteA
SHChangeNotify
ntdll
ZwSystemDebugControl
NtQuerySystemInformation
Sections
.text Size: 104KB - Virtual size: 104KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.haxed Size: 4KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE