Static task
static1
Behavioral task
behavioral1
Sample
971234264b489eacf506fdc220faa4ed.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
971234264b489eacf506fdc220faa4ed.exe
Resource
win10v2004-20231215-en
General
-
Target
971234264b489eacf506fdc220faa4ed
-
Size
96KB
-
MD5
971234264b489eacf506fdc220faa4ed
-
SHA1
63f75354eb0ccdc69de1c1837a620d69c17fad25
-
SHA256
48a691202fb1f7c0ad1390ad2183d0129c63fcee08fe4087bd82300dc67dd9c9
-
SHA512
940a50126e96fdae3b1cb64bd603d4d98b9eee8ef0bcaf3f8ce12160cb67a75b3ed9e7f2814e8566b8ded0fdde75a36ca5e1155b2fc7272036220babe877a535
-
SSDEEP
1536:NiO1wMgj6AwqvxFkocuMiBk4fvVzrhCwGRAoXJivd+:UOahfkxuMofvVPgRN5i0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 971234264b489eacf506fdc220faa4ed
Files
-
971234264b489eacf506fdc220faa4ed.exe windows:4 windows x86 arch:x86
74f99b8b6379752eda6caaa3d3f8cda2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
ShellExecuteA
FindExecutableA
user32
GetWindowWord
SetWindowWord
BeginPaint
GetSysColor
GetClientRect
SetRect
EndPaint
LoadCursorA
GetLastActivePopup
ShowWindow
PostMessageA
SendMessageA
EnableWindow
DestroyWindow
SetWindowTextA
SetForegroundWindow
SetActiveWindow
SendDlgItemMessageA
UpdateWindow
OemToCharBuffA
CharUpperBuffA
DefWindowProcA
KillTimer
DialogBoxIndirectParamA
GetDlgItemTextA
EndDialog
GetWindowRect
GetSystemMetrics
SetWindowPos
GetKeyState
PeekMessageA
TranslateMessage
DispatchMessageA
GetParent
SetDlgItemTextA
GetDlgItem
InvalidateRect
wsprintfA
MessageBoxA
SetCursor
CharNextA
RegisterClassA
SetTimer
kernel32
VirtualAlloc
HeapFree
HeapAlloc
HeapReAlloc
RtlUnwind
GetCommandLineA
GetModuleHandleA
SetErrorMode
GetSystemDirectoryA
LoadLibraryA
GetProcAddress
FreeLibrary
_lwrite
lstrcmpiA
GetVolumeInformationA
_lcreat
CreateFileA
CloseHandle
ExitProcess
GetSystemTime
WriteFile
GetModuleFileNameA
GetVersion
GlobalMemoryStatus
lstrcatA
FindClose
FindFirstFileA
GetCurrentDirectoryA
SetCurrentDirectoryA
CreateDirectoryA
SetFileTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
LocalAlloc
_lopen
GetDriveTypeA
WinExec
lstrcpyA
lstrlenA
_lclose
GlobalLock
GlobalAlloc
GlobalFree
GlobalUnlock
GlobalHandle
LocalFree
GetEnvironmentVariableA
GetWindowsDirectoryA
_llseek
_lread
gdi32
SetBkColor
SetTextColor
SetTextAlign
GetBkColor
GetTextExtentPoint32A
ExtTextOutA
CreateDCA
GetDeviceCaps
CreateFontIndirectA
DeleteDC
SelectObject
DeleteObject
advapi32
RegQueryValueA
comctl32
ord17
Sections
.text Size: 24KB - Virtual size: 22KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 56KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ