Static task
static1
Behavioral task
behavioral1
Sample
729362b2d194390101af17831c12ac0c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
729362b2d194390101af17831c12ac0c.exe
Resource
win10v2004-20231222-en
General
-
Target
729362b2d194390101af17831c12ac0c
-
Size
993KB
-
MD5
729362b2d194390101af17831c12ac0c
-
SHA1
710f973b13de11a509bc3e1057efc88d212dd072
-
SHA256
9d64b1f32583d8f9b24ff84f8c336ba4fc54e4768697120227925b662747cea1
-
SHA512
4d7f23a12bbd137f630b0fa690825e7bd205732c35705d8909bc2d78154675f0ff5f2b6ccb1aabc1a3fd7802cf8815841ed29c903a3b91214f89fba71aef9bd3
-
SSDEEP
24576:fodalvE38BZK9ZVHrWUQx/cQ6vbsRG6ELOGfT:Q05w93HCtx0QaDh37
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 729362b2d194390101af17831c12ac0c
Files
-
729362b2d194390101af17831c12ac0c.exe windows:5 windows x86 arch:x86
d7e1d74585499ba8c86266aa9e75bff2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DeleteFileW
GlobalLock
CopyFileW
InterlockedIncrement
GlobalUnlock
lstrcmpW
MulDiv
GetExitCodeProcess
CreateDirectoryW
GetTempPathW
GetFileAttributesW
GetTickCount
GetStartupInfoW
CreateProcessW
GetACP
HeapFree
HeapSize
HeapReAlloc
LoadLibraryW
HeapAlloc
GetProcessHeap
FreeLibrary
InterlockedCompareExchange
MultiByteToWideChar
WideCharToMultiByte
GetCurrentProcess
GetVersionExW
GetNativeSystemInfo
InitializeCriticalSection
ReadFile
SetFilePointer
GetFileSize
SetEndOfFile
WriteConsoleW
SetStdHandle
FreeEnvironmentStringsW
GlobalAlloc
GetCommandLineA
GetOEMCP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
CreateFileW
GetConsoleCP
FlushFileBuffers
ReadConsoleW
GetConsoleMode
SetFilePointerEx
GetFileType
GetStdHandle
GetModuleHandleExW
ExitProcess
RtlUnwind
CreateTimerQueue
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
ReleaseSemaphore
DuplicateHandle
LoadLibraryExW
GetModuleHandleA
FreeLibraryAndExitThread
GetThreadTimes
GetCurrentThread
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetDiskFreeSpaceExW
SetEvent
GetCurrentThreadId
LeaveCriticalSection
GetModuleFileNameW
RemoveDirectoryW
InterlockedDecrement
EnterCriticalSection
SetLastError
GetEnvironmentStringsW
GetSystemTimeAsFileTime
GetLogicalProcessorInformation
GetThreadPriority
SetThreadPriority
CreateThread
SwitchToThread
SignalObjectAndWait
VirtualFree
VirtualAlloc
FlushInstructionCache
InterlockedPushEntrySList
InterlockedPopEntrySList
OutputDebugStringW
InitializeSListHead
GetCurrentProcessId
IsDebuggerPresent
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsProcessorFeaturePresent
WaitForSingleObjectEx
ResetEvent
GetCPInfo
GetLocaleInfoW
LCMapStringW
EncodePointer
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
WriteFile
GetModuleHandleW
GetProcAddress
CloseHandle
CreateEventW
DeleteCriticalSection
DecodePointer
RaiseException
GetLastError
InitializeCriticalSectionAndSpinCount
LocalFree
GetCommandLineW
Sleep
QueryPerformanceCounter
GetStringTypeW
GetSystemInfo
VirtualProtect
VirtualQuery
LoadLibraryExA
TryEnterCriticalSection
user32
EndPaint
BeginPaint
GetCursorPos
ReleaseDC
GetWindowTextW
UnregisterClassW
ReleaseCapture
RegisterWindowMessageW
GetParent
GetClassInfoExW
GetDesktopWindow
PostThreadMessageW
GetDlgItem
InvalidateRect
SetWindowLongW
wsprintfW
SetCapture
GetSystemMetrics
ShowWindow
MsgWaitForMultipleObjects
PostQuitMessage
KillTimer
SetTimer
DispatchMessageW
TranslateMessage
PeekMessageW
GetClassNameW
GetWindowLongW
GetWindowTextLengthW
DefWindowProcW
CallWindowProcW
GetWindow
GetFocus
DestroyWindow
GetDC
SetWindowPos
FillRect
CreateWindowExW
ScreenToClient
SendMessageW
SetWindowTextW
RegisterClassExW
IsWindow
InvalidateRgn
RedrawWindow
ClientToScreen
DestroyAcceleratorTable
IsChild
GetSysColor
MoveWindow
CreateAcceleratorTableW
SetFocus
CharNextW
LoadCursorW
GetClientRect
gdi32
BitBlt
CreateCompatibleBitmap
SelectObject
CreateCompatibleDC
GetStockObject
GetDeviceCaps
DeleteDC
GetObjectW
DeleteObject
CreateSolidBrush
shell32
SHGetFolderPathW
CommandLineToArgvW
ole32
StringFromCLSID
CoCreateGuid
CoTaskMemFree
CoAddRefServerProcess
CoReleaseServerProcess
OleUninitialize
CoTaskMemAlloc
StringFromGUID2
CoCreateInstance
CLSIDFromProgID
CreateStreamOnHGlobal
OleInitialize
CLSIDFromString
OleLockRunning
CoGetClassObject
oleaut32
SysStringLen
VariantCopy
SysFreeString
VariantClear
SysAllocString
DispCallFunc
VariantChangeType
LoadRegTypeLi
VariantInit
LoadTypeLi
OleCreateFontIndirect
SysAllocStringLen
advapi32
CryptDestroyKey
CryptAcquireContextW
CryptVerifySignatureW
CryptCreateHash
CryptHashData
CryptDestroyHash
CryptReleaseContext
RegSetValueExW
RegNotifyChangeKeyValue
RegCreateKeyExW
RegQueryValueExW
RegCloseKey
shlwapi
PathFindFileNameW
ws2_32
ntohl
Sections
.text Size: 360KB - Virtual size: 360KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 120KB - Virtual size: 120KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 23KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 439KB - Virtual size: 439KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 26KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ