Static task
static1
Behavioral task
behavioral1
Sample
89c24636fb09f8cb34a017330ab616fe.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
89c24636fb09f8cb34a017330ab616fe.exe
Resource
win10v2004-20231215-en
General
-
Target
89c24636fb09f8cb34a017330ab616fe
-
Size
41KB
-
MD5
89c24636fb09f8cb34a017330ab616fe
-
SHA1
9a7752384783c1e8c658db1551911cf7f49e4388
-
SHA256
43d6defd10a06df2a36ec11e044f382651c0d4eb9837093f17865799a489d775
-
SHA512
54eeac72ab230f46f3715e775bf81656e0bd4fae66b7574efc42b3bf0e3bd64caafccb68b8c72ad83c03e278b68bda55468a5732376be501ed2a9629af58b709
-
SSDEEP
768:FkDKZIJOOZNEMraJKZJO9+CvawGf8Me8Y4eaERLxLU/nZaZ:OKakOn3eEJOoCGf8Z7AZy
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 89c24636fb09f8cb34a017330ab616fe
Files
-
89c24636fb09f8cb34a017330ab616fe.exe windows:5 windows x86 arch:x86
a1adb0844877d6d25a821edcad15ef99
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcmpW
FoldStringW
GetCurrentProcessId
GetCommandLineW
MulDiv
GetFullPathNameW
LocalSize
GetLastError
WriteFile
SetLastError
FindFirstFileW
SetEndOfFile
DeleteFileW
GetACP
GetDateFormatW
GetTimeFormatW
GlobalLock
GlobalUnlock
GlobalAlloc
LoadLibraryA
VirtualProtect
FindClose
HeapSetInformation
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
GetModuleHandleA
VirtualAlloc
HeapAlloc
WideCharToMultiByte
GetProcAddress
user32
SetCursor
SetWindowPos
GetWindowTextW
CreateDialogParamW
DialogBoxParamW
EnableWindow
FindWindowW
GetSystemMetrics
MoveWindow
SendMessageW
CharNextW
CheckMenuItem
CloseClipboard
IsClipboardFormatAvailable
OpenClipboard
GetMenuState
EnableMenuItem
SetForegroundWindow
advapi32
OpenServiceW
QueryServiceConfigW
CloseServiceHandle
IsTextUnicode
RegOpenKeyExW
RegCreateKeyW
RegCloseKey
RegQueryValueExW
RegSetValueExW
RegOpenKeyA
OpenSCManagerW
Sections
.text Size: 37KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 578B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ