Static task
static1
Behavioral task
behavioral1
Sample
98710c7c7c8425b78139fea99aee23d5.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
98710c7c7c8425b78139fea99aee23d5.exe
Resource
win10v2004-20231215-en
General
-
Target
98710c7c7c8425b78139fea99aee23d5
-
Size
430KB
-
MD5
98710c7c7c8425b78139fea99aee23d5
-
SHA1
1b04583b08e3e09a278c647e55bda7844c4abdb8
-
SHA256
709f0542375445e8bce7d0856e641ad5548f02c05fb4c24bd058ad2898bdea22
-
SHA512
3f53450152157a0ab56ad310e0fa9e5fd7c68673e56064cc9d1b58fe9f6f7171370a1d940306a982be8fe50c98d8052e5b0313a7a032c6a491594c489328501a
-
SSDEEP
12288:iKCLFDX8iFQ+puFfFBzrjqnzbxKeW0IaP:iKCJb8nZFfFBzrezbcer9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 98710c7c7c8425b78139fea99aee23d5
Files
-
98710c7c7c8425b78139fea99aee23d5.exe windows:4 windows x86 arch:x86
494ab5ecf663cf79d3ad856973dbc98b
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
CascadeWindows
GetDlgCtrlID
IsWindowVisible
SetWindowPlacement
GetTopWindow
CloseWindow
GetWindowTextLengthA
GetParent
BringWindowToTop
SendDlgItemMessageA
GetSysColor
ole32
StgIsStorageILockBytes
CoInstall
CoGetObject
ReadClassStg
OleCreateLinkToFileEx
CLSIDFromString
OleCreateLink
CoUnmarshalInterface
CoIsHandlerConnected
CoTreatAsClass
FmtIdToPropStgName
CoRegisterPSClsid
oledlg
ord6
ord12
ord10
ord3
ord11
ord7
ord4
ord1
ord8
ord2
oleaut32
OleSavePictureFile
advapi32
RegSaveKeyA
RegEnumKeyA
RegLoadKeyA
RegCloseKey
RegDeleteKeyA
RegFlushKey
RegDeleteValueA
RegSetValueExA
RegConnectRegistryA
RegOpenKeyExA
kernel32
GetModuleHandleA
GetCommandLineA
GetVersion
ExitProcess
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
GetProcAddress
GetStdHandle
GetFileType
GetCurrentThreadId
TlsSetValue
TlsAlloc
GetStringTypeW
TlsGetValue
GetLastError
HeapDestroy
HeapCreate
VirtualFree
HeapFree
WriteFile
GetStartupInfoA
GetStringTypeA
SetLastError
RtlUnwind
SetHandleCount
PulseEvent
ReleaseSemaphore
LocalLock
LocalFlags
HeapLock
LocalAlloc
VirtualAllocEx
CreateEventA
GlobalFree
GetOverlappedResult
HeapValidate
GetPrivateProfileIntA
GetPrivateProfileStructA
GetProfileStringA
WritePrivateProfileStructA
WritePrivateProfileStringA
LCMapStringW
LCMapStringA
MultiByteToWideChar
LoadLibraryA
HeapReAlloc
VirtualAlloc
HeapAlloc
GetOEMCP
GetACP
GetCPInfo
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
Sections
.text Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 289KB - Virtual size: 376KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.nulsit Size: 111KB - Virtual size: 111KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ