Static task
static1
Behavioral task
behavioral1
Sample
9a08a27783ccabf09adeed5151ce3952.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9a08a27783ccabf09adeed5151ce3952.exe
Resource
win10v2004-20231222-en
General
-
Target
9a08a27783ccabf09adeed5151ce3952
-
Size
96KB
-
MD5
9a08a27783ccabf09adeed5151ce3952
-
SHA1
7b89968528200d9b491c4d2bf2481c8675930f40
-
SHA256
8044c6a73ddafa2bb8cc9119c1e64eea69212c3698600f93d2da88d45521a5d5
-
SHA512
c8da819e00c952fe84cb64dafb7e67665619fe4478625f7af1a1fcae1ca50616a64fb4f1ffd8ddbc16c06bcca8c6e6bca3fbfadc48475e4d8265271182f6ddd0
-
SSDEEP
1536:Rj0lEkpFoee4Fdek96JBIKXGehlFTafB4aEFbbHqABTPYhL87NLz0KBJGy1/fFdQ:UF1e4Pek9hKXGeSVOqABTPYhLg7/f
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 9a08a27783ccabf09adeed5151ce3952
Files
-
9a08a27783ccabf09adeed5151ce3952.exe windows:4 windows x86 arch:x86
3839cd29c749b008b225b4cae0af64df
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
psapi
EnumProcessModules
GetModuleBaseNameW
GetModuleFileNameExW
comctl32
ImageList_Create
InitCommonControlsEx
ImageList_SetBkColor
ImageList_ReplaceIcon
ws2_32
recv
send
connect
htons
gethostbyname
socket
WSAStartup
shlwapi
StrStrA
PathRemoveExtensionW
PathStripPathW
SHDeleteKeyA
StrToIntA
wvnsprintfA
PathStripToRootW
PathIsDirectoryW
PathFindExtensionW
StrStrW
PathSkipRootW
PathRemoveFileSpecW
kernel32
Module32FirstW
GetModuleFileNameW
CreateToolhelp32Snapshot
Module32NextW
CreateThread
ExitProcess
CreateFileA
QueryDosDeviceA
Process32NextW
lstrcmpiW
GetCommandLineW
lstrlenW
lstrcpyA
LocalFree
GetProcAddress
LoadLibraryA
lstrcpyW
GetLongPathNameW
CloseHandle
ReadFile
CreateFileW
WriteFile
GetModuleHandleA
MultiByteToWideChar
GlobalAlloc
GlobalFree
lstrcmpA
GetFileAttributesW
DeleteFileW
RemoveDirectoryW
SetFileAttributesW
GetShortPathNameW
MoveFileW
GetVersionExA
GlobalUnlock
GlobalLock
GlobalReAlloc
FindClose
FindNextFileW
lstrcmpW
FindFirstFileW
lstrlenA
MoveFileExW
VirtualFreeEx
WaitForSingleObject
CreateRemoteThread
WriteProcessMemory
VirtualAllocEx
OpenProcess
DuplicateHandle
GetCurrentProcess
TerminateProcess
Process32FirstW
user32
DialogBoxParamA
DestroyWindow
DispatchMessageA
TranslateMessage
PeekMessageA
ShowWindow
GetDlgItem
CreateDialogParamA
wsprintfA
CharUpperW
GetDlgItemTextW
UpdateWindow
InvalidateRect
GetSysColor
MoveWindow
GetClientRect
ClientToScreen
CallWindowProcA
DestroyCursor
SetWindowLongA
SetCapture
SetCursor
LoadCursorA
PtInRect
ReleaseCapture
GetSystemMetrics
LoadIconA
DestroyIcon
SetDlgItemTextA
SetDlgItemTextW
SetWindowTextA
PostMessageA
GetWindowRect
GetWindowPlacement
EndDialog
SetWindowPlacement
GetDC
SendMessageA
DrawTextA
MessageBoxA
wsprintfW
SendDlgItemMessageA
gdi32
GetObjectA
CreateFontIndirectA
SelectObject
comdlg32
GetSaveFileNameW
advapi32
SetNamedSecurityInfoW
RegSetValueExW
RegCreateKeyExA
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
FreeSid
SetEntriesInAclA
AllocateAndInitializeSid
RegSetValueExA
shell32
CommandLineToArgvW
ShellExecuteA
ExtractIconExW
SHCreateDirectoryExW
SHFileOperationW
SHGetMalloc
SHGetPathFromIDListW
SHBrowseForFolderW
ole32
CoInitialize
CoUninitialize
Sections
.text Size: 87KB - Virtual size: 87KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ