Static task
static1
Behavioral task
behavioral1
Sample
961271809f5505314b10cbff7088c20b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
961271809f5505314b10cbff7088c20b.exe
Resource
win10v2004-20231215-en
General
-
Target
961271809f5505314b10cbff7088c20b
-
Size
262KB
-
MD5
961271809f5505314b10cbff7088c20b
-
SHA1
dcf7cdce08634964e256abbd3fe00a50a503fb3c
-
SHA256
d83aa69f9e7c4c64fe8cd9807f53958db3be6f3580d4b410bd4fd1cfd78b9401
-
SHA512
9f94e13b47afcb09a3225d6b5f9995668a6f470137fe342bcf3650ae2b7650b678af19331e3a652d6f744a013c772d8063c0171dca62877a360a4cbfc3b6587c
-
SSDEEP
6144:osUxTyqy/NBotC9qjRXVT4F2nGADfDRXPhU:BfNLyRXVT4F2Gq7bU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 961271809f5505314b10cbff7088c20b
Files
-
961271809f5505314b10cbff7088c20b.exe windows:4 windows x86 arch:x86
45542bece9b9221f00205eb74d7e7fe0
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LocalAlloc
LoadLibraryExW
SetLastError
SizeofResource
LockResource
LoadResource
FindResourceW
LocalFree
FormatMessageW
GetModuleHandleW
DeleteCriticalSection
RaiseException
FreeLibrary
CloseHandle
RemoveDirectoryW
CreateEventW
GetLogicalDriveStringsW
WritePrivateProfileSectionW
GetPrivateProfileSectionW
GetFullPathNameW
lstrcpynW
GetFullPathNameA
AreFileApisANSI
lstrcpynA
SetUnhandledExceptionFilter
GetCurrentThreadId
GetSystemTimeAsFileTime
UnhandledExceptionFilter
GetThreadLocale
GetACP
WaitForMultipleObjects
GetModuleHandleA
CreateFileA
GetFileSize
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
VirtualProtect
CreateFileW
ReadFile
WriteFile
SetEndOfFile
SetFilePointer
DeleteFileW
MoveFileW
CopyFileW
GetTempPathW
GetShortPathNameW
SetFileTime
EnterCriticalSection
LeaveCriticalSection
lstrlenW
lstrlenA
WideCharToMultiByte
DosDateTimeToFileTime
LocalFileTimeToFileTime
DeviceIoControl
GetLogicalDrives
CreateThread
FindFirstFileW
FindNextFileW
FindClose
CreateDirectoryW
WaitForSingleObject
CopyFileExW
GetSystemInfo
GetExitCodeThread
CreatePipe
DuplicateHandle
CreateProcessW
GetDriveTypeW
MoveFileExW
SetEnvironmentVariableW
IsValidLocale
GetProcAddress
user32
DrawTextW
LoadBitmapW
ReleaseDC
DestroyCursor
SetCapture
SetRectEmpty
TrackMouseEvent
GetDC
GetNextDlgTabItem
GetWindowLongW
SetCursor
GetCursorPos
GetParent
GetAsyncKeyState
PtInRect
DrawFocusRect
CopyRect
ScreenToClient
GetFocus
FillRect
ReleaseCapture
GetSysColor
LoadCursorW
SetRect
GetClientRect
EnableWindow
OffsetRect
InflateRect
UnregisterClassA
IsWindow
GetWindowRect
PeekMessageW
DispatchMessageW
MsgWaitForMultipleObjects
PostMessageW
SetWindowPos
GetKeyState
GetSystemMenu
EnableMenuItem
IsWindowVisible
InvalidateRect
SendMessageW
gdi32
CreateFontW
DeleteDC
GetDeviceCaps
SetDIBits
GetDIBits
CreateDIBitmap
GetTextMetricsW
GetTextExtentPoint32W
CreateFontIndirectW
DeleteObject
SelectObject
GetCurrentObject
SetTextColor
BitBlt
CreateCompatibleBitmap
LPtoDP
GetMapMode
GetObjectW
GetBkColor
DPtoLP
GetTextColor
CreateCompatibleDC
advapi32
RegSetValueExW
RegDeleteValueW
OpenThreadToken
EqualSid
GetTokenInformation
OpenProcessToken
FreeSid
AllocateAndInitializeSid
RegQueryValueExW
RegCloseKey
RegCreateKeyExW
RegOpenKeyExW
shell32
SHGetDesktopFolder
DragAcceptFiles
ShellExecuteW
DragQueryFileW
SHGetMalloc
comctl32
InitCommonControlsEx
ole32
CoInitialize
CoUninitialize
CoInitializeEx
CoCreateInstance
CoTaskMemFree
oleaut32
LoadTypeLi
DispCallFunc
VariantClear
LoadRegTypeLi
SysStringLen
VariantCopy
VariantChangeType
VariantInit
SysAllocString
SysFreeString
msoert2
PszAllocA
shimeng
SE_DllUnloaded
SE_InstallAfterInit
SE_ProcessDying
Sections
.text Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.I Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.EL Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.U Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 212KB - Virtual size: 214KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.SuFNRt Size: 512B - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ