Static task
static1
Behavioral task
behavioral1
Sample
89685b06e07707c4daac7743eec06595.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
89685b06e07707c4daac7743eec06595.exe
Resource
win10v2004-20231215-en
General
-
Target
89685b06e07707c4daac7743eec06595
-
Size
3.2MB
-
MD5
89685b06e07707c4daac7743eec06595
-
SHA1
cf1ba3aa353421c87a37112b568c60cdb17a163b
-
SHA256
5b04c73ab47878cf65cdda82744a048fe37995822bfc87a4ae13f74bfc11388c
-
SHA512
cd9b1504bd58eb2e050bedc6c12699f23131c90e9b5faee03c43ac61ac5fb7c8c504c5b71a3522a45c0cec2d3f416bfc2597aa8f4b7bcea279170d8dd15a1973
-
SSDEEP
49152:FlQ29+MS9//IabjKoh9WsC+DtoZwBMO+YrovpU/9l:fQ29+MgIabjKoh9WsCpPOgG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 89685b06e07707c4daac7743eec06595
Files
-
89685b06e07707c4daac7743eec06595.exe windows:5 windows x86 arch:x86
5002bceb823d3d7321ac4b2e8ee9f66d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_BIND
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCloseKey
CryptReleaseContext
RegQueryValueExW
RegQueryValueExA
RegOpenKeyExW
RegOpenKeyExA
RegCreateKeyExW
RegCreateKeyExA
kernel32
FindFirstFileW
FindResourceA
FindFirstFileA
GetFileAttributesA
GetModuleFileNameW
GetModuleHandleW
SetFileAttributesA
SetFileAttributesW
FindNextFileA
FindNextFileW
DeleteFileW
GetPrivateProfileIntW
GetTempPathA
GetTempPathW
SizeofResource
LockResource
LoadResource
SetLastError
CopyFileA
CopyFileW
RemoveDirectoryA
RemoveDirectoryW
CreateMutexW
CreateFileA
LoadLibraryA
LoadLibraryW
GetPrivateProfileStringA
GetPrivateProfileStringW
CreateProcessW
FindClose
SetErrorMode
DeleteCriticalSection
GetTickCount
IsBadReadPtr
InterlockedExchange
GlobalAddAtomA
GlobalDeleteAtom
GetVersionExA
GetSystemTimeAsFileTime
GetACP
GetVersionExW
QueryPerformanceCounter
QueryPerformanceFrequency
InterlockedIncrement
InterlockedDecrement
IsDBCSLeadByte
GetCurrentProcessId
GetProcessTimes
GetLocalTime
FlushFileBuffers
GetAtomNameA
lstrcmpA
RaiseException
DeleteFileA
CreateFileW
CreateEventW
LocalReAlloc
WaitForSingleObject
CloseHandle
ReleaseMutex
lstrlenA
WideCharToMultiByte
lstrlenW
ExitProcess
Sleep
GetLastError
GetCommandLineA
LocalFree
MultiByteToWideChar
SetUnhandledExceptionFilter
LocalAlloc
GetCommandLineW
GetCurrentThreadId
InitializeCriticalSection
GetModuleHandleA
UnmapViewOfFile
GetCurrentProcess
LeaveCriticalSection
GetPrivateProfileIntA
SetEvent
CreateProcessA
CreateMutexA
lstrcpynA
DuplicateHandle
CreateFileMappingA
CreateEventA
MapViewOfFile
WriteFile
GetModuleFileNameA
EnterCriticalSection
GetProcAddress
SetFilePointer
FreeLibrary
CreateFileMappingW
user32
GetDoubleClickTime
SetTimer
KillTimer
GetSubMenu
EnableMenuItem
GetForegroundWindow
SetForegroundWindow
GetCursorPos
LoadMenuA
SetFocus
RegisterWindowMessageA
IsWindow
GetWindowTextA
DestroyWindow
TranslateMessage
DestroyIcon
CreateWindowExA
CreateWindowExW
DefWindowProcA
DefWindowProcW
DispatchMessageA
FindWindowW
FindWindowExA
FindWindowExW
GetMessageA
GetMessageW
MessageBoxW
GetWindowLongA
GetWindowLongW
LoadCursorA
LoadCursorW
CreateIconFromResource
CreateIconFromResourceEx
LookupIconIdFromDirectoryEx
LoadImageA
LoadImageW
DestroyMenu
DispatchMessageW
TrackPopupMenuEx
LoadStringW
PostMessageA
PostMessageW
PostThreadMessageA
PostThreadMessageW
RegisterWindowMessageW
CharNextA
SendMessageTimeoutA
SendMessageTimeoutW
SetWindowLongA
SetWindowLongW
SystemParametersInfoA
SystemParametersInfoW
RegisterClassExA
RegisterClassExW
GetClassInfoExA
GetClassInfoExW
GetSysColor
ReleaseDC
GetDC
GetSystemMetrics
LoadStringA
wvsprintfA
MessageBoxA
gdi32
GetDeviceCaps
GetPaletteEntries
DeleteObject
Sections
.text Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 40KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ