Static task
static1
Behavioral task
behavioral1
Sample
97e76ac69d49f5c51bca893f2e43e55d.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
97e76ac69d49f5c51bca893f2e43e55d.exe
Resource
win10v2004-20231222-en
General
-
Target
97e76ac69d49f5c51bca893f2e43e55d
-
Size
124KB
-
MD5
97e76ac69d49f5c51bca893f2e43e55d
-
SHA1
dbf2b9b37043b82ea4df945397f186214870ac8f
-
SHA256
ae746b8a4da15709f55ae2758234e1119a910e7c34a5b07d5d802d24abf5784c
-
SHA512
9d34342746e01be587380732d5229c4314258f34e6b875c0b5610522801928b8ae2d68acec0141619a409c9f59164b0a2aac164a898f7059e0ce3a3925c4a1a3
-
SSDEEP
3072:zAPA7YD61osm0/tbNe8x7GMNjYRsajeIeaBUXy73sIHa:OcRY4ksUJea6Xy7sI6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 97e76ac69d49f5c51bca893f2e43e55d
Files
-
97e76ac69d49f5c51bca893f2e43e55d.exe windows:4 windows x86 arch:x86
d173b9cf9548c080d6ac6b40fb2d1f0c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LocalReAlloc
LocalSize
lstrlenA
LocalAlloc
GlobalMemoryStatusEx
WinExec
SetFilePointer
lstrcatA
GetFileAttributesA
lstrcpyW
lstrcmpiA
Process32First
CreateToolhelp32Snapshot
Module32Next
Module32First
GetModuleHandleA
GetDiskFreeSpaceExA
WideCharToMultiByte
MultiByteToWideChar
lstrcpyA
OutputDebugStringA
CreateThread
InitializeCriticalSection
SetErrorMode
OpenEventA
GetTickCount
ReleaseMutex
GetVersionExA
WriteFile
GetStartupInfoA
GetProcessHeap
HeapAlloc
HeapFree
GetModuleFileNameA
DeleteFileA
MoveFileA
ExitProcess
GetWindowsDirectoryA
TerminateThread
OpenProcess
FreeLibrary
WriteProcessMemory
CreateRemoteThread
GetCurrentProcess
CreateFileA
LocalFree
GetDriveTypeA
CancelIo
SetEvent
ResetEvent
WaitForSingleObject
CloseHandle
CreateEventA
Sleep
LoadLibraryA
GetProcAddress
EnterCriticalSection
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
Process32Next
user32
GetProcessWindowStation
OpenWindowStationA
SetProcessWindowStation
wsprintfA
CharNextA
OpenDesktopA
PostMessageA
GetThreadDesktop
GetUserObjectInformationA
OpenInputDesktop
SetThreadDesktop
CloseDesktop
GetWindowTextA
ExitWindowsEx
EnumWindows
IsWindowVisible
GetWindowThreadProcessId
SendMessageA
advapi32
AbortSystemShutdownA
SetSecurityDescriptorDacl
RegSetKeySecurity
FreeSid
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenEventLogA
ClearEventLogA
CloseEventLog
RegOpenKeyA
SetEntriesInAclA
GetNamedSecurityInfoA
BuildExplicitAccessWithNameA
SetNamedSecurityInfoA
RegCreateKeyA
RegSetValueExA
OpenServiceA
QueryServiceStatus
ControlService
DeleteService
CloseServiceHandle
RegOpenKeyExA
RegQueryValueA
RegCloseKey
AddAccessAllowedAce
InitializeAcl
GetLengthSid
AllocateAndInitializeSid
RegEnumValueA
RegEnumKeyExA
RegQueryValueExA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
CreateProcessAsUserA
SetTokenInformation
DuplicateTokenEx
StartServiceA
GetUserNameA
LookupAccountSidA
GetTokenInformation
InitializeSecurityDescriptor
shell32
SHGetFileInfoA
shlwapi
SHDeleteKeyA
msvcrt
_strnicmp
__set_app_type
_strrev
_onexit
__dllonexit
_controlfp
_strupr
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
??3@YAXPAX@Z
__CxxFrameHandler
_CxxThrowException
memmove
ceil
_ftol
strstr
??2@YAPAXI@Z
free
malloc
strrchr
rename
_except_handler3
strncpy
strtok
strncat
strchr
atoi
strncmp
_errno
realloc
mbstowcs
wcslen
wcstombs
wcscpy
_mbsstr
_mbscmp
atol
sprintf
_beginthreadex
_snprintf
calloc
??1type_info@@UAE@XZ
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
ws2_32
accept
getpeername
bind
inet_addr
listen
gethostname
getsockname
send
ioctlsocket
sendto
inet_ntoa
WSAStartup
WSACleanup
recvfrom
WSAIoctl
setsockopt
connect
htons
gethostbyname
__WSAFDIsSet
select
closesocket
recv
ntohs
socket
msvcp60
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Xran@std@@YAXXZ
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
wininet
InternetCloseHandle
InternetOpenA
wtsapi32
WTSEnumerateSessionsA
WTSQuerySessionInformationW
WTSFreeMemory
WTSQuerySessionInformationA
WTSLogoffSession
WTSQueryUserToken
WTSDisconnectSession
userenv
CreateEnvironmentBlock
netapi32
NetUserSetInfo
NetUserAdd
NetLocalGroupAddMembers
NetUserGetLocalGroups
NetApiBufferFree
NetUserGetInfo
NetUserEnum
NetUserDel
Sections
.text Size: 88KB - Virtual size: 85KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ