Static task
static1
Behavioral task
behavioral1
Sample
989e78ec8055b54f550871ca1bd24dda.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
989e78ec8055b54f550871ca1bd24dda.exe
Resource
win10v2004-20231215-en
General
-
Target
989e78ec8055b54f550871ca1bd24dda
-
Size
36KB
-
MD5
989e78ec8055b54f550871ca1bd24dda
-
SHA1
fc9b0110f191ed62bcd5d70322804780b00c5e97
-
SHA256
bb08c098366bb444b04a9ed77eb820c31d150ae15c4047c07a450caf2a206fe0
-
SHA512
f9068edba08fcba896df1806315c665cd7b5916c84dae741da52635ce82e47cdb5245e83732395fd21da14936c7db12f9f06211a85ae230dfba8087f3dfc376e
-
SSDEEP
768:WS2ym/Db7+lJa3yT4wE1Yl0lK36s9OkNIkLV+6c6dSty:GbbKea46iEkry
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 989e78ec8055b54f550871ca1bd24dda
Files
-
989e78ec8055b54f550871ca1bd24dda.exe windows:5 windows x86 arch:x86
e0f0d0a666d31098743a09e57b653b8b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrlenW
GetWindowsDirectoryW
VirtualAlloc
BindIoCompletionCallback
BuildCommDCBA
CallNamedPipeW
CompareStringW
CopyFileExW
CreateDirectoryA
CreateFileA
CreatePipe
CreateProcessW
CreateTimerQueue
DeleteTimerQueueEx
DisconnectNamedPipe
DnsHostnameToComputerNameA
EnumLanguageGroupLocalesA
EnumResourceLanguagesW
EnumSystemCodePagesA
EnumUILanguagesA
FileTimeToDosDateTime
FindClose
FindResourceA
FindResourceExW
FlushFileBuffers
FoldStringA
FreeEnvironmentStringsW
FreeLibrary
FreeUserPhysicalPages
GetCPInfoExA
GetCalendarInfoA
GetConsoleAliasesLengthW
GetConsoleTitleW
GetDefaultCommConfigW
GetDiskFreeSpaceExA
GetEnvironmentStringsW
GetExitCodeThread
GetFileAttributesExA
GetFileAttributesExW
GetFileAttributesW
GetFullPathNameA
GetLocaleInfoW
GetLogicalDriveStringsA
GetLogicalDriveStringsW
GetLongPathNameW
GetMailslotInfo
GetPrivateProfileSectionW
GetPrivateProfileStructA
GetProfileStringW
lstrcpyW
GetSystemDefaultLCID
GetSystemTimeAdjustment
GetThreadPriority
GetThreadSelectorEntry
GetUserDefaultLangID
HeapValidate
IsSystemResumeAutomatic
LoadResource
LocalCompact
LocalLock
LockFile
Module32Next
MoveFileWithProgressA
OutputDebugStringA
Process32FirstW
PulseEvent
ReadConsoleInputW
ReadConsoleOutputAttribute
ReplaceFile
ResumeThread
RtlUnwind
ScrollConsoleScreenBufferA
SearchPathA
SetCommTimeouts
SetConsoleCP
SetConsoleCursorPosition
SetConsoleTextAttribute
SetEndOfFile
SetFilePointerEx
SetStdHandle
SetSystemPowerState
SetSystemTime
SetTapePosition
SetUnhandledExceptionFilter
SetVolumeLabelA
SetVolumeLabelW
Thread32First
Toolhelp32ReadProcessMemory
UnmapViewOfFile
VerifyVersionInfoW
VirtualProtect
WaitForSingleObject
WaitForSingleObjectEx
WinExec
WriteConsoleInputA
WriteConsoleInputW
WritePrivateProfileStringA
_lclose
GetShortPathNameA
CreateFileW
user32
OpenClipboard
OpenDesktopA
OpenInputDesktop
OpenWindowStationA
PeekMessageA
RegisterClassExA
RegisterClassW
RemovePropA
ReplyMessage
SendMessageTimeoutA
SendNotifyMessageA
SetClassWord
SetLayeredWindowAttributes
SetMenuDefaultItem
SetProcessDefaultLayout
SetRectEmpty
SetUserObjectInformationA
ShowCaret
ShowWindowAsync
TranslateAccelerator
WINNLSGetIMEHotkey
WaitForInputIdle
WinHelpA
WindowFromDC
wvsprintfA
OemToCharBuffW
NotifyWinEvent
MsgWaitForMultipleObjects
LookupIconIdFromDirectoryEx
LockSetForegroundWindow
LoadStringW
LoadMenuIndirectA
LoadAcceleratorsA
IsWindowEnabled
IsDialogMessage
IsCharAlphaW
IMPGetIMEW
GrayStringA
GetWindowModuleFileName
GetWindowInfo
GetUpdateRgn
GetTabbedTextExtentA
GetSystemMetrics
GetSubMenu
GetScrollInfo
GetPriorityClipboardFormat
GetParent
GetNextDlgTabItem
GetMessagePos
GetMenuStringW
GetMenuStringA
GetMenuBarInfo
GetKeyNameTextW
GetDesktopWindow
GetCursorPos
GetClassWord
GetClassNameA
GetAsyncKeyState
EnumThreadWindows
EnumDisplaySettingsExW
EnumDisplaySettingsA
EnableMenuItem
DrawIconEx
DragDetect
DispatchMessageA
DestroyCursor
DestroyAcceleratorTable
DeregisterShellHookWindow
DefMDIChildProcA
DefFrameProcA
DdeQueryStringW
DdeQueryStringA
DdeCreateDataHandle
DdeAbandonTransaction
CreateIcon
CreateDesktopW
CreateAcceleratorTableW
CloseDesktop
ClipCursor
CheckMenuItem
CharUpperW
CharToOemBuffA
CallWindowProcW
CallWindowProcA
CallNextHookEx
CallMsgFilter
BroadcastSystemMessage
AttachThreadInput
DrawStateA
advapi32
RegOpenKeyExA
shell32
Shell_NotifyIconW
Shell_NotifyIcon
ShellExecuteW
ShellExecuteExW
ShellExecuteExA
ShellExecuteEx
ShellExecuteA
DoEnvironmentSubstA
DoEnvironmentSubstW
DragQueryFile
DragQueryFileW
ExtractAssociatedIconA
ExtractAssociatedIconExA
ExtractAssociatedIconW
ExtractIconA
ExtractIconEx
ExtractIconExA
ExtractIconExW
FindExecutableA
FindExecutableW
SHAddToRecentDocs
SHChangeNotify
SHCreateDirectoryExA
ShellAboutW
SHCreateDirectoryExW
SHEmptyRecycleBinA
SHFileOperation
SHGetDataFromIDListA
SHGetDataFromIDListW
SHGetDesktopFolder
SHGetDiskFreeSpaceExA
SHGetDiskFreeSpaceExW
SHGetFileInfo
SHGetFileInfoA
SHGetFolderLocation
SHGetFolderPathA
SHGetFolderPathW
SHGetIconOverlayIndexA
SHGetIconOverlayIndexW
SHGetMalloc
SHGetPathFromIDList
SHGetPathFromIDListW
SHGetSpecialFolderLocation
SHGetSpecialFolderPathA
SHGetSpecialFolderPathW
SHInvokePrinterCommandW
SHIsFileAvailableOffline
SHLoadInProc
SHPathPrepareForWriteW
SHQueryRecycleBinW
ShellAboutA
shlwapi
StrChrA
StrChrIA
StrChrW
StrCmpNA
StrRChrIA
StrRChrIW
StrRStrIA
StrStrIA
StrStrA
Sections
.text Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 328B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ