Static task
static1
Behavioral task
behavioral1
Sample
9884269debe9c693f4c88fa12651a0b9.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9884269debe9c693f4c88fa12651a0b9.exe
Resource
win10v2004-20231215-en
General
-
Target
9884269debe9c693f4c88fa12651a0b9
-
Size
101KB
-
MD5
9884269debe9c693f4c88fa12651a0b9
-
SHA1
03d2a10ebb0cb1514a04610edb5dda8cfbcb90ff
-
SHA256
fc6be31059163536a12a43d7b93f9b0037a4a356e4eacfc73cc966eb60747f03
-
SHA512
a175f82763c4140eee4d5542a6bc39dd280e2b4b95574841c3103075e491b641f57e6c3756c6a505a7928315899136867adbb1d13f7fb4432317eee923c62386
-
SSDEEP
1536:0wWLNiGR1tN5gqt9RMscA4D0DqokB6gz47Wgs0LZ8LzdqKH4:xGR1NgqRcAehRgsIgzdqJ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 9884269debe9c693f4c88fa12651a0b9
Files
-
9884269debe9c693f4c88fa12651a0b9.exe windows:4 windows x86 arch:x86
9ebce803811a8492073923e35733c9ea
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegDeleteValueA
RegLoadKeyA
gdi32
GetDIBits
CreatePenIndirect
CreateFontIndirectA
GetPixel
SelectObject
GetCurrentPositionEx
SaveDC
CopyEnhMetaFileA
kernel32
LocalAlloc
FreeLibrary
GlobalFindAtomA
ExitProcess
VirtualAllocEx
GetProcAddress
LoadLibraryExA
ExitThread
GetModuleHandleA
GetFileSize
GetLocalTime
user32
DispatchMessageA
ChildWindowFromPoint
InsertMenuA
GetClientRect
InvalidateRect
GetScrollRange
GetCursor
SetTimer
GetWindowThreadProcessId
SetForegroundWindow
IsWindowEnabled
TranslateMDISysAccel
SendMessageW
CheckMenuItem
GetCapture
CreateWindowExA
ClientToScreen
DefWindowProcA
IsDialogMessageA
DestroyIcon
GetMessagePos
GetKeyboardLayoutNameA
UnregisterClassA
OpenClipboard
IntersectRect
GetKeyState
CallNextHookEx
WaitMessage
TranslateMessage
GetWindowDC
PostQuitMessage
GetKeyboardState
SystemParametersInfoA
SetWindowPlacement
GetDC
CharNextW
ScrollWindow
EnableWindow
PeekMessageW
EmptyClipboard
LoadIconA
SetWindowsHookExA
SetParent
SetPropA
SetCursor
ShowScrollBar
GetWindowRect
MessageBeep
SetClassLongA
FindWindowA
AdjustWindowRectEx
IsIconic
GetPropA
PeekMessageA
GetClassLongA
GetMenuState
GetFocus
TrackPopupMenu
RegisterClipboardFormatA
CreateMenu
DrawIconEx
ReleaseCapture
UnhookWindowsHookEx
CharLowerA
EnableMenuItem
CharLowerBuffA
ReleaseDC
EqualRect
GetKeyNameTextA
ActivateKeyboardLayout
DrawFrameControl
SetFocus
GetSystemMetrics
GetSystemMenu
SetScrollRange
IsChild
MoveWindow
OffsetRect
InsertMenuItemA
GetTopWindow
RemovePropA
RegisterWindowMessageA
KillTimer
EnumThreadWindows
IsWindow
SetRect
GetWindowLongW
DeleteMenu
GetMenuItemCount
DrawTextA
RemoveMenu
GetSubMenu
GetLastActivePopup
EndPaint
GetMenuItemInfoA
SetWindowLongA
GetDlgItem
FrameRect
SetScrollInfo
GetIconInfo
SetCapture
EnableScrollBar
EnumWindows
LoadBitmapA
GetForegroundWindow
MapWindowPoints
PostMessageA
GetKeyboardLayoutList
CharNextA
ShowOwnedPopups
InflateRect
GetMenuStringA
DrawIcon
ShowWindow
GetSysColorBrush
ScreenToClient
DestroyWindow
DestroyMenu
GetActiveWindow
oleaut32
SafeArrayUnaccessData
SysFreeString
SafeArrayGetElement
VariantCopyInd
SysReAllocStringLen
shlwapi
SHStrDupA
SHSetValueA
SHGetValueA
comdlg32
GetOpenFileNameA
FindTextA
ChooseColorA
shell32
SHGetDiskFreeSpaceA
msvcrt
log
calloc
strncmp
memcpy
version
GetFileVersionInfoSizeA
VerQueryValueA
VerInstallFileA
ole32
CoReleaseMarshalData
CreateStreamOnHGlobal
CoUninitialize
CoFreeUnusedLibraries
CreateOleAdviseHolder
MkParseDisplayName
CreateBindCtx
OleRun
StringFromIID
CoRegisterClassObject
comctl32
ImageList_Destroy
ImageList_Read
ImageList_DragShowNolock
ImageList_DrawEx
ImageList_Add
ImageList_Draw
ImageList_Create
ImageList_Write
Sections
.text Size: 30KB - Virtual size: 29KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bss Size: 1024B - Virtual size: 599B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ