Static task
static1
Behavioral task
behavioral1
Sample
79ea124eb1e469efa8e5a2651bf34b6c.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
79ea124eb1e469efa8e5a2651bf34b6c.exe
Resource
win10v2004-20231222-en
General
-
Target
79ea124eb1e469efa8e5a2651bf34b6c
-
Size
178KB
-
MD5
79ea124eb1e469efa8e5a2651bf34b6c
-
SHA1
93186c3e8ac46f1015ccf1952bbe733b7dd10d92
-
SHA256
d635ee3cfea4008a53b6a26520b7663e66b79611da70bae6db70cdb674933e5d
-
SHA512
6970316aaedcccfcf7dfaaa664c9e65770a7f17aef17d78c3b73133f76496ba3af51e1f8b394d745319efbe89296ef96c594b1a237413b34fd256ac50af18945
-
SSDEEP
3072:9Hi9tXh43wP8etJXWGG02aHHSAbz7oAnSfQi8udJhfKUuKiYRQ4M5kYn+NDyck:9HwH8WHZDo8SfWu31ndq4XYn+d
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 79ea124eb1e469efa8e5a2651bf34b6c
Files
-
79ea124eb1e469efa8e5a2651bf34b6c.exe windows:4 windows x86 arch:x86
b39a8684a935f5447e4a2012e468fbac
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
EqualSid
GetUserNameA
InitializeSecurityDescriptor
LockServiceDatabase
LookupPrivilegeValueA
RegDeleteKeyA
RegOpenKeyA
RegQueryInfoKeyA
StartServiceA
kernel32
AddAtomA
CloseHandle
CreateEventA
CreateFileMappingA
CreateMutexA
CreateThread
DeleteAtom
DisableThreadLibraryCalls
EnumSystemLocalesA
ExitProcess
ExitThread
FindFirstFileA
FindResourceA
FlushFileBuffers
FreeLibrary
GetACP
GetCPInfo
GetConsoleCP
GetConsoleMode
GetConsoleOutputCP
GetCurrentDirectoryA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetDateFormatA
GetEnvironmentStringsA
GetEnvironmentVariableA
GetExitCodeProcess
GetFileSize
GetFileTime
GetLastError
GetLocalTime
GetLocaleInfoA
GetModuleFileNameA
GetModuleHandleA
GetPrivateProfileSectionNamesA
GetProcAddress
GetProcessHeap
GetStdHandle
GetSystemTime
GetTempPathA
GetTickCount
GetTimeFormatA
GetVersionExA
GetWindowsDirectoryA
GlobalLock
HeapCreate
HeapFree
InitializeCriticalSection
InterlockedDecrement
InterlockedExchange
IsBadCodePtr
IsBadReadPtr
IsDebuggerPresent
IsValidCodePage
LeaveCriticalSection
LoadResource
LocalAlloc
LocalFree
Module32First
Module32Next
MultiByteToWideChar
OpenProcess
OutputDebugStringA
QueryPerformanceCounter
ReadFile
ReleaseMutex
ResumeThread
SetCurrentDirectoryA
SetEndOfFile
SetEnvironmentVariableA
SetEvent
SetLastError
Sleep
TlsSetValue
UnhandledExceptionFilter
UnmapViewOfFile
VirtualAlloc
WriteConsoleA
WriteFile
lstrcatA
lstrcmpiA
lstrlenA
ole32
CoRevokeClassObject
CreateStreamOnHGlobal
OleSaveToStream
user32
CallNextHookEx
CharLowerA
CharPrevA
CheckRadioButton
CreateWindowExA
DestroyWindow
DialogBoxParamA
DispatchMessageA
EnableMenuItem
ExitWindowsEx
FillRect
GetCapture
GetDesktopWindow
GetMenuItemCount
GetSysColor
GetWindowLongA
GetWindowTextLengthA
LoadIconA
LoadStringA
MessageBoxA
OffsetRect
PeekMessageA
ReleaseCapture
SendDlgItemMessageA
SendMessageA
SetDlgItemInt
SetFocus
SetRect
UnhookWindowsHookEx
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
Sections
CODE Size: 56KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
BSS Size: - Virtual size: 212KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
CRT Size: 114KB - Virtual size: 116KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ