Static task
static1
Behavioral task
behavioral1
Sample
723de29a04c20bbf7ea47ba0154c7f21.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
723de29a04c20bbf7ea47ba0154c7f21.exe
Resource
win10v2004-20231222-en
General
-
Target
723de29a04c20bbf7ea47ba0154c7f21
-
Size
696KB
-
MD5
723de29a04c20bbf7ea47ba0154c7f21
-
SHA1
2af6cba31e4a65620cd051bc85bf89017ff1e790
-
SHA256
bec479b64aa543a7007a5d6f33ca254d7c49bd914dc01fc775dbc4fa6fbaf771
-
SHA512
cca243db5c83e2b2b1e9a3f43d8fd20620285e0f89f5740e987e084e9bb7e52a19d4f53f931dc5120312d04a8abe67354dfa76d7b0dec9b379e1a965b950427b
-
SSDEEP
12288:b5ghdD7W0S/hEc6imhWsOBxZmDm199eoXGqNuo9smqqScGqnuCNRmzFxyi7w:b5ghdDqQgZl3GSuZB1+uCWb7w
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 723de29a04c20bbf7ea47ba0154c7f21
Files
-
723de29a04c20bbf7ea47ba0154c7f21.exe windows:4 windows x86 arch:x86
92e6fde7760ad83c3d7bf0410010bf08
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LCMapStringA
LCMapStringW
GetCPInfo
IsValidLocale
IsValidCodePage
GetLocaleInfoA
EnumSystemLocalesA
VirtualAlloc
IsBadWritePtr
SetUnhandledExceptionFilter
IsBadCodePtr
SetStdHandle
FlushFileBuffers
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetStringTypeA
GetStringTypeW
GetLocaleInfoW
GetCurrentDirectoryW
DeleteFileA
WaitForSingleObject
GetUserDefaultLCID
GetExitCodeProcess
MultiByteToWideChar
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentVariableA
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
HeapFree
HeapSize
HeapAlloc
HeapReAlloc
GetVersion
GetCommandLineA
GetStartupInfoA
GetModuleHandleA
GetCurrentProcess
TerminateProcess
ExitProcess
RtlUnwind
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
GetSystemTime
GetOEMCP
GetTickCount
GetLastError
Sleep
GetCurrentDirectoryA
CloseHandle
SetEndOfFile
SetFilePointer
MoveFileA
CompareFileTime
FileTimeToLocalFileTime
FileTimeToDosDateTime
SystemTimeToFileTime
SetFileAttributesA
GetFileAttributesA
GetLocalTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
SetFileTime
WriteFile
GetACP
ReadFile
GetFileSize
LocalFree
FormatMessageA
GetFullPathNameW
GetFullPathNameA
GetTempPathW
GetTempPathA
GetModuleFileNameW
GetModuleFileNameA
MoveFileW
CopyFileW
CopyFileA
DeleteFileW
GetFileAttributesW
CreateDirectoryW
CreateDirectoryA
SetCurrentDirectoryW
SetCurrentDirectoryA
SetFileAttributesW
GetFileTime
GetTimeZoneInformation
CreateFileA
CreateFileW
IsBadReadPtr
GetVersionExA
GetProcAddress
LoadLibraryA
LocalAlloc
FreeLibrary
WideCharToMultiByte
user32
SetWindowPos
OffsetRect
CreateWindowExW
DialogBoxParamW
LoadCursorA
RegisterClassExW
GetMessageA
TranslateMessage
DispatchMessageA
MessageBoxA
GetDlgItem
SendMessageA
LoadStringW
PostMessageA
SetTimer
GetDlgItemTextA
LoadStringA
DefWindowProcA
DestroyWindow
BeginPaint
EndPaint
SetDlgItemTextW
GetDlgItemTextW
SetWindowTextW
MoveWindow
EnableWindow
SetDlgItemTextA
EndDialog
PostQuitMessage
MessageBoxW
GetDesktopWindow
GetWindowRect
CopyRect
shell32
SHBrowseForFolderW
SHGetMalloc
SHGetPathFromIDListW
ShellExecuteExW
crypt32
CertCloseStore
CertNameToStrA
CertFreeCertificateContext
CryptDecodeObject
ws2_32
WSAGetLastError
socket
inet_addr
htons
gethostbyname
connect
WSAStartup
ioctlsocket
select
bind
closesocket
shutdown
send
recv
wininet
InternetCombineUrlA
advapi32
RegCloseKey
CryptReleaseContext
CryptAcquireContextA
CryptGenRandom
RegQueryValueExA
RegOpenKeyExA
GetUserNameA
oleaut32
SysAllocString
SysFreeString
SysStringLen
Sections
.text Size: 444KB - Virtual size: 440KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 60KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 100KB - Virtual size: 114KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ