M:\HQP\JTE\P
Static task
static1
Behavioral task
behavioral1
Sample
9766734e7689ae3a544c4ec793bd7654.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9766734e7689ae3a544c4ec793bd7654.exe
Resource
win10v2004-20231222-en
General
-
Target
9766734e7689ae3a544c4ec793bd7654
-
Size
457KB
-
MD5
9766734e7689ae3a544c4ec793bd7654
-
SHA1
b647ba381e0153681c4e9ff4e8b473064313fa67
-
SHA256
58ca8a9c73787f16abd89c23c54bc3ddc66ed7ef946b423d449a9e22439bd25c
-
SHA512
5d1655fd0158a54e2cecb8368df850d9f75634a9bc23fcc4cc0f48e08611838ebef71fb72dcb82d3e7b1c4ce36c13d7b75267f40b406dabf84685fcdac5597ba
-
SSDEEP
6144:/Vik/EqD4nLZPyfcy53ckTHnJZiVzRq/eIzvoFxkiGY1zqHA1ON3eY7olwF3GSzO:9iksGNH7JoPIzvGx7dNONuY7oSpzD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 9766734e7689ae3a544c4ec793bd7654
Files
-
9766734e7689ae3a544c4ec793bd7654.exe windows:4 windows x86 arch:x86
203f730d247f8ce0d161ea19c1df8210
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetCommandLineW
CreateMutexA
CreateNamedPipeW
GetStartupInfoW
UnhandledExceptionFilter
lstrcmpA
FreeEnvironmentStringsA
WriteConsoleOutputAttribute
CompareStringA
HeapAlloc
SetEnvironmentVariableA
InterlockedExchange
LoadLibraryExW
LeaveCriticalSection
OpenFileMappingW
HeapReAlloc
CompareStringW
DeleteCriticalSection
LoadLibraryA
ReadFile
LCMapStringA
GetStringTypeW
SetLastError
DeleteFileA
WideCharToMultiByte
GetCurrentThreadId
MultiByteToWideChar
TlsSetValue
VirtualAlloc
TerminateProcess
GetLastError
InitializeCriticalSection
GetCurrentProcessId
GetStdHandle
GetFileType
GetCommandLineA
GetLocalTime
InitializeCriticalSectionAndSpinCount
GetCurrentProcess
TlsGetValue
GetEnvironmentStringsW
LCMapStringW
FreeLibrary
GetTimeZoneInformation
TlsAlloc
HeapCreate
SystemTimeToTzSpecificLocalTime
OpenSemaphoreW
GetStartupInfoA
EnterCriticalSection
OpenMutexA
FlushFileBuffers
SetHandleCount
GetModuleFileNameA
IsBadWritePtr
HeapDestroy
GetSystemTime
GetStringTypeA
WriteFile
CloseHandle
QueryPerformanceCounter
VirtualFree
EnumCalendarInfoW
GetNumberFormatW
HeapFree
CreateNamedPipeA
GetTickCount
FreeEnvironmentStringsW
RtlUnwind
AddAtomW
GetCPInfo
GetSystemTimeAsFileTime
GetEnvironmentStrings
SetStdHandle
GetLogicalDrives
VirtualQuery
GetCompressedFileSizeW
SetFilePointer
GetModuleFileNameW
GetProcAddress
InterlockedDecrement
GetModuleHandleA
GetFullPathNameW
GetCurrentThread
GetVersion
TlsFree
InterlockedIncrement
ExitProcess
GetCalendarInfoW
wininet
ShowX509EncodedCertificate
FindFirstUrlCacheGroup
comctl32
InitCommonControlsEx
shell32
ShellExecuteA
SHAppBarMessage
SHGetMalloc
DragQueryFileA
user32
RegisterClassA
GetCursorPos
AdjustWindowRectEx
GetMessageTime
CallWindowProcW
RegisterClassExA
gdi32
OffsetWindowOrgEx
ExtTextOutW
EnumFontFamiliesW
GetGraphicsMode
GetRandomRgn
SetColorAdjustment
CreateDIBitmap
Sections
.text Size: 286KB - Virtual size: 286KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 55KB - Virtual size: 82KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 103KB - Virtual size: 102KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ