Static task
static1
Behavioral task
behavioral1
Sample
71c8ef3ac2ece8025f5e0d34711c3836.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
71c8ef3ac2ece8025f5e0d34711c3836.exe
Resource
win10v2004-20231215-en
General
-
Target
71c8ef3ac2ece8025f5e0d34711c3836
-
Size
584KB
-
MD5
71c8ef3ac2ece8025f5e0d34711c3836
-
SHA1
c4cbc4ec92c0ad889ecae734c1f79e30b78947b2
-
SHA256
ab98e57682eb26be86a8730daff994f0d469feea3310f448393761ddf27db87f
-
SHA512
2a013645e96e39940bd1b06a1d0f6e8c461280e1ef8d3fcacbf170fded403b04f0943fcc5d9b1d92af2789e2bbcdd72466d5aedaf516e51be556aef7aac43108
-
SSDEEP
12288:5Bp+YVJxPAXqX5fz2DvXum7fRsoq04NYDumvFG:5Bp+YV4Xo2ranCV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 71c8ef3ac2ece8025f5e0d34711c3836
Files
-
71c8ef3ac2ece8025f5e0d34711c3836.exe windows:4 windows x86 arch:x86
f8472517081197aaff5b652f4671e10f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcat
SetStdHandle
TryEnterCriticalSection
ContinueDebugEvent
InterlockedDecrement
GetSystemTimeAsFileTime
MultiByteToWideChar
LCMapStringA
CompareStringA
WriteFile
SetFilePointer
lstrcpynA
HeapValidate
GetProcAddress
GetLogicalDriveStringsA
GetCPInfo
HeapCreate
CompareStringW
FreeLibraryAndExitThread
FreeEnvironmentStringsW
SetFileTime
GetACP
HeapDestroy
QueryPerformanceCounter
SetHandleCount
HeapReAlloc
GetStartupInfoA
TlsGetValue
GetThreadSelectorEntry
UnlockFileEx
GetFullPathNameA
GetCurrentThreadId
LocalFlags
GetPrivateProfileIntA
CreateMutexA
GetFileType
ReadFile
GetTickCount
InterlockedIncrement
ResumeThread
VirtualQuery
TlsSetValue
AllocConsole
SetCriticalSectionSpinCount
CreateMailslotA
SetLastError
ExitProcess
GetEnvironmentStringsW
UnhandledExceptionFilter
OpenMutexA
SetTimeZoneInformation
GetDriveTypeA
GetVersion
ReadConsoleOutputA
GetEnvironmentStrings
CloseHandle
InitializeCriticalSection
GetStdHandle
FindFirstFileExW
HeapFree
CopyFileExA
GetCurrentProcess
FreeEnvironmentStringsA
GetStringTypeExA
GetStringTypeW
WideCharToMultiByte
VirtualFreeEx
RtlUnwind
GlobalCompact
FindNextFileA
GetSystemDefaultLCID
SetEnvironmentVariableA
GetCommandLineA
InterlockedExchangeAdd
GetSystemDirectoryW
GetCurrentThread
LeaveCriticalSection
IsBadWritePtr
GetCurrentProcessId
TlsFree
HeapAlloc
FillConsoleOutputAttribute
WaitForSingleObjectEx
VirtualUnlock
VirtualAlloc
FlushFileBuffers
GetLastError
EnumCalendarInfoExW
lstrcmp
GetSystemTime
VirtualFree
TlsAlloc
LoadLibraryA
InterlockedExchange
GetTimeZoneInformation
LCMapStringW
GetModuleHandleA
EnterCriticalSection
GetThreadPriority
DeleteCriticalSection
GetStringTypeA
LocalCompact
GetConsoleTitleA
GetOEMCP
GetFileAttributesExW
CommConfigDialogA
InitializeCriticalSectionAndSpinCount
GetLocalTime
FlushConsoleInputBuffer
IsBadReadPtr
GetLogicalDrives
MapViewOfFile
TerminateProcess
GlobalHandle
GetModuleFileNameA
user32
ImpersonateDdeClientWindow
GetClipboardData
InsertMenuW
DdeAddData
DdeQueryConvInfo
GetProcessWindowStation
GetKeyboardLayout
BroadcastSystemMessageW
CheckMenuItem
ShowWindow
CreateIconFromResourceEx
DlgDirListA
BeginDeferWindowPos
SetMenuInfo
ExitWindowsEx
FindWindowExA
UnregisterClassA
SystemParametersInfoA
GetIconInfo
GetTopWindow
RegisterClassA
RegisterClassExA
DdeAbandonTransaction
DrawStateA
SetTimer
DestroyIcon
FindWindowW
GetWindowRgn
SetWindowsHookExW
EnumDesktopWindows
DestroyAcceleratorTable
DdeSetQualityOfService
SetWindowPos
EnumDisplaySettingsExA
SetSysColors
SetWindowTextW
CharLowerBuffA
SubtractRect
CreateCursor
GetClientRect
ChangeMenuA
SendMessageTimeoutA
CopyAcceleratorTableW
ScrollDC
DragDetect
ToUnicode
TabbedTextOutA
GetMenuState
OemToCharBuffW
DefDlgProcW
CreateMDIWindowA
EqualRect
RealGetWindowClass
EnableScrollBar
comctl32
ImageList_GetDragImage
ImageList_Copy
ImageList_DragShowNolock
CreateToolbarEx
ImageList_Remove
MakeDragList
GetEffectiveClientRect
ImageList_Read
CreateStatusWindowA
InitCommonControlsEx
Sections
.text Size: 140KB - Virtual size: 139KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 252KB - Virtual size: 251KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 112KB - Virtual size: 129KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 76KB - Virtual size: 74KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ