Static task
static1
Behavioral task
behavioral1
Sample
96d0657f23921635eb1b90af10858a31.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
96d0657f23921635eb1b90af10858a31.exe
Resource
win10v2004-20231222-en
General
-
Target
96d0657f23921635eb1b90af10858a31
-
Size
343KB
-
MD5
96d0657f23921635eb1b90af10858a31
-
SHA1
f181fb41fcd4fba13f46e0c5f163820b6a23ab14
-
SHA256
e89e5d3906b0daf3d16ab135af6b51a09fd2fb80384aee550801516e38ef3a55
-
SHA512
7efa1d3ba32a170acb02288767ac63eab3b9f995405c1f18c96d20e2f20cdc7ae2fb0c7bb1f7b07721f84737c70909e5e09d5c0ad81392a6d50b14056b0991c1
-
SSDEEP
3072:/E3Mo//G3K7VYO+Cqcfj6aC/Kfa6pt+Pb1MLaVyPcDxXz32SQiTi7auUwyaO:83sKP+CuiTpt+PDM0DxXE7aZYO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 96d0657f23921635eb1b90af10858a31
Files
-
96d0657f23921635eb1b90af10858a31.exe windows:5 windows
d11ad5bd0cfaf709abf346741922fcdf
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualFreeEx
GetCalendarInfoA
GetNamedPipeInfo
GetBinaryTypeA
ReadFile
lstrcatA
SetConsoleTitleA
InterlockedExchange
GetLongPathNameW
GetProcAddress
ResetEvent
LoadLibraryA
LocalAlloc
FoldStringW
GetModuleFileNameA
WideCharToMultiByte
GetVolumeNameForVolumeMountPointW
EnumSystemLocalesW
lstrcpyA
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
FlushFileBuffers
CloseHandle
CreateFileW
HeapReAlloc
HeapAlloc
GetStringTypeW
LCMapStringW
MultiByteToWideChar
ReadConsoleA
FreeLibrary
GetConsoleAliasExesLengthA
lstrlenA
GetPrivateProfileSectionNamesW
CreateTimerQueue
GetShortPathNameW
GetDateFormatW
WriteConsoleW
SetStdHandle
GetModuleHandleW
ExitProcess
DecodePointer
GetCommandLineA
HeapSetInformation
GetStartupInfoW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
TerminateProcess
GetCurrentProcess
IsProcessorFeaturePresent
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
LeaveCriticalSection
FatalAppExitA
EnterCriticalSection
GetLastError
SetConsoleCtrlHandler
LoadLibraryW
GetLocaleInfoW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
GetCurrentThread
WriteFile
GetStdHandle
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapCreate
HeapDestroy
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
SetFilePointer
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapFree
Sleep
RaiseException
HeapSize
RtlUnwind
IsValidLocale
user32
GetMessageTime
CharUpperBuffW
SendDlgItemMessageA
RealGetWindowClassA
LoadCursorW
CharLowerW
GetIconInfo
CharToOemW
MsgWaitForMultipleObjectsEx
SetMenuItemInfoW
gdi32
GetGlyphOutlineA
GetEnhMetaFilePaletteEntries
CreateScalableFontResourceW
GetTextMetricsA
GetEnhMetaFileW
advapi32
ReportEventA
ole32
CoGetCurrentProcess
Sections
.text Size: 96KB - Virtual size: 96KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 4.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 207KB - Virtual size: 206KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ