Static task
static1
Behavioral task
behavioral1
Sample
96696d19827e14846c6c75312c6b1376.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
96696d19827e14846c6c75312c6b1376.exe
Resource
win10v2004-20231222-en
General
-
Target
96696d19827e14846c6c75312c6b1376
-
Size
81KB
-
MD5
96696d19827e14846c6c75312c6b1376
-
SHA1
1c68855846c3abc1d241db05ebcbf09f2e65fe45
-
SHA256
bdd12618a0535d659b5e1ee0626ef4cedb7bbbd7f5e16fa274919c4a6c46f48b
-
SHA512
e52a06f6f37d57c352703cc2ce6f2bccf29f65ea65ab29d49e75284b52c096cc2983d8edd637f46549e6bee0d6004a139e88423777df55c3ba3bfdb92f0aa643
-
SSDEEP
1536:xwPdorByINJpffVa85TiUD5h2alY1+JjgB9HRwPRiLEbYd:WPk4+nHD5ztsAYL9d
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 96696d19827e14846c6c75312c6b1376
Files
-
96696d19827e14846c6c75312c6b1376.exe windows:4 windows x86 arch:x86
9173b716444b51148b9114b366125b4f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
malloc
atan
memmove
strncmp
comdlg32
GetFileTitleA
user32
GetParent
GetScrollPos
IsWindowVisible
DrawIcon
GetMenuItemInfoA
EnableWindow
IsWindowEnabled
GetScrollInfo
GetWindowTextA
SystemParametersInfoA
IsChild
GetSubMenu
TrackPopupMenu
GetSysColor
GetKeyState
GetSysColorBrush
GetCursor
GetKeyNameTextA
IsMenu
GetMenuState
GetScrollRange
SetWindowLongA
GetMessagePos
GetMenuItemID
GetPropA
HideCaret
GetFocus
GetLastActivePopup
GetWindow
GetMenuStringA
DrawFrameControl
oleaut32
RegisterTypeLib
VariantCopyInd
SafeArrayUnaccessData
SysStringLen
VariantChangeType
SysFreeString
SafeArrayCreate
shell32
SHGetFileInfoA
kernel32
GetStringTypeA
GetModuleHandleA
GetLocalTime
SetHandleCount
LocalReAlloc
GetCurrentThreadId
GetProcAddress
FindFirstFileA
GetLocaleInfoA
FindResourceA
VirtualFree
GetCurrentProcess
MoveFileA
GetFileType
lstrcpynA
FreeResource
GetACP
GetVersionExA
GetStringTypeW
GetVersion
GetSystemDefaultLangID
ExitThread
lstrcatA
SetErrorMode
LocalFree
lstrcpyA
LocalAlloc
DeleteCriticalSection
GetCommandLineA
CreateEventA
GlobalDeleteAtom
EnumCalendarInfoA
ResetEvent
LoadLibraryA
GetEnvironmentStrings
DeleteFileA
Sleep
GetOEMCP
GetModuleFileNameA
CloseHandle
GetFileSize
ReadFile
RaiseException
HeapDestroy
lstrcmpA
HeapAlloc
VirtualAllocEx
VirtualAlloc
LockResource
LoadLibraryExA
GetTickCount
MulDiv
SetLastError
SetThreadLocale
InitializeCriticalSection
GetStdHandle
GetStartupInfoA
lstrlenA
ExitProcess
GetCPInfo
GlobalFindAtomA
GlobalAlloc
GetLastError
GetThreadLocale
gdi32
CreateFontIndirectA
SetPixel
GetBitmapBits
Sections
.text Size: 34KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
INIT Size: 44KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.init Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ