Static task
static1
Behavioral task
behavioral1
Sample
86fc3f9815a9889531ae91097910c00f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
86fc3f9815a9889531ae91097910c00f.exe
Resource
win10v2004-20231215-en
General
-
Target
86fc3f9815a9889531ae91097910c00f
-
Size
29KB
-
MD5
86fc3f9815a9889531ae91097910c00f
-
SHA1
d71647fe0737e2d3638f9d9103ea32883b965c2d
-
SHA256
3cd915521f1c1c286930cf7da23671ec94e91ecf4f93562b2e53de87705c97e2
-
SHA512
eca7c56f43fdc0b8583dbf60b63ed8b07cadc463306058279bbe34530f9a84dab19f9b1075f8628255f92ac3b2930e2b49b5e814f6702713be507e2b1ce103df
-
SSDEEP
768:KpppjDTBVgY+xgUiX8b7LZlyzDjb4zndoA/:SpP8gUisbCvkoA/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 86fc3f9815a9889531ae91097910c00f
Files
-
86fc3f9815a9889531ae91097910c00f.exe .vbs windows:1 windows x86 arch:x86 polyglot
dd8b7257e685184559ebeee5e21a91c6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
RegCloseKey
RegOpenKeyExA
CloseServiceHandle
CreateServiceA
OpenSCManagerA
RegQueryValueExA
RegSetValueExA
RegisterServiceCtrlHandlerA
SetServiceStatus
StartServiceA
StartServiceCtrlDispatcherA
gdi32
BitBlt
CreateCompatibleBitmap
CreateCompatibleDC
CreateFontIndirectA
CreateSolidBrush
DeleteDC
DeleteObject
GetDeviceCaps
GetStockObject
GetTextMetricsA
MoveToEx
SelectObject
SetBkColor
SetBkMode
SetTextAlign
SetTextColor
kernel32
CloseHandle
CopyFileA
CreateFileA
CreateThread
EnumResourceNamesA
ExitProcess
GetCommandLineA
GetCurrentDirectoryA
GetCurrentThreadId
GetExitCodeThread
GetFileType
GetLastError
GetLocalTime
GetModuleFileNameA
GetModuleHandleA
GetStartupInfoA
GetVersionExA
GlobalAlloc
GlobalFree
GlobalReAlloc
MultiByteToWideChar
ReadFile
ResumeThread
SetCurrentDirectoryA
SetEndOfFile
SetErrorMode
SetFileAttributesA
SetFilePointer
SetLastError
Sleep
SuspendThread
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
WaitForSingleObject
WideCharToMultiByte
WriteFile
CreateEventA
GetCurrentProcess
GetDriveTypeA
GetSystemDirectoryA
GetVolumePathNamesForVolumeNameA
GlobalAddAtomA
GlobalDeleteAtom
GlobalFindAtomA
SetEvent
SetPriorityClass
RtlMoveMemory
FindFirstVolumeA
FindNextVolumeA
FindVolumeClose
ole32
CLSIDFromProgID
CoCreateInstance
CoInitialize
CoUninitialize
ProgIDFromCLSID
oleaut32
GetActiveObject
SafeArrayCreate
SysAllocStringByteLen
SysFreeString
SysStringByteLen
VariantClear
VariantCopy
user32
AttachThreadInput
CheckRadioButton
ClientToScreen
CreateDialogIndirectParamA
CreateDialogParamA
CreateWindowExA
DestroyIcon
DestroyWindow
DialogBoxIndirectParamA
DispatchMessageA
EnableWindow
FillRect
GetClientRect
GetDC
GetDlgItem
GetForegroundWindow
GetMenu
GetMenuItemInfoA
GetSysColor
GetSysColorBrush
GetWindowLongA
GetWindowRect
GetWindowTextA
GetWindowTextLengthA
GetWindowThreadProcessId
IsDialogMessageA
IsWindow
LoadImageA
MapDialogRect
MessageBoxA
PeekMessageA
PostMessageA
RedrawWindow
ReleaseDC
ScreenToClient
SendMessageA
SetFocus
SetForegroundWindow
SetWindowLongA
SetWindowPos
SetWindowTextA
ShowWindow
SystemParametersInfoA
TranslateMessage
DialogBoxParamA
GetWindow
shell32
ShellExecuteA
ws2_32
accept
bind
closesocket
gethostbyname
gethostname
listen
send
socket
WSACleanup
WSAGetLastError
WSAStartup
htons
inet_addr
shutdown
Sections
.text Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.link Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 964B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rloc Size: 1024B - Virtual size: 888B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ