Static task
static1
Behavioral task
behavioral1
Sample
98a9d6b26e2427ff689b965d76f495e4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
98a9d6b26e2427ff689b965d76f495e4.exe
Resource
win10v2004-20231215-en
General
-
Target
98a9d6b26e2427ff689b965d76f495e4
-
Size
420KB
-
MD5
98a9d6b26e2427ff689b965d76f495e4
-
SHA1
c1f8c90956c64731e4a4fffafcc1492b6ebbe45c
-
SHA256
dd50e115c3ee4d4513b501ddb9a97631c88a50367e7515fec92e2cef5359abbf
-
SHA512
ae94b0302f600d67afbe5ac70a9e531b495625c851ee1fe5306352937449914740e1571809f6087e187a098678f6e08b1381750a67df0abe81f4ce28e1b5bd0a
-
SSDEEP
12288:bIlHFf83IfXYYFi//eIcI5/xDD7bN9hefe:bIlB8wF43p7jhefe
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 98a9d6b26e2427ff689b965d76f495e4
Files
-
98a9d6b26e2427ff689b965d76f495e4.exe windows:4 windows x86 arch:x86
c5b0b76fa993f666741a896c6f0ee26d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetSystemTimeAsFileTime
WriteConsoleA
SetStdHandle
SetUnhandledExceptionFilter
GlobalUnlock
GlobalFree
EnterCriticalSection
VirtualProtect
CloseHandle
lstrcmpiA
GetLocalTime
FlushFileBuffers
GetExitCodeProcess
Sleep
GetVersionExA
SetEvent
WriteFile
FindResourceW
GetModuleHandleW
UnmapViewOfFile
ReadFile
ReleaseMutex
GetStringTypeA
DuplicateHandle
WriteConsoleW
GetEnvironmentStringsW
SetEnvironmentVariableA
GetProcAddress
LoadLibraryW
TlsFree
LocalFree
LocalAlloc
IsDebuggerPresent
HeapDestroy
TerminateProcess
VirtualFree
InterlockedCompareExchange
WideCharToMultiByte
ResetEvent
FindFirstFileA
SetLastError
RaiseException
FormatMessageA
GetFileType
lstrcpynA
LCMapStringA
LCMapStringW
MulDiv
GetModuleFileNameW
GetThreadLocale
lstrlenW
CreateProcessW
HeapAlloc
FindFirstFileW
GetPrivateProfileStringA
WaitForMultipleObjects
FindNextFileA
GetProcessHeap
CreateProcessA
InterlockedIncrement
GetVersion
GetFileAttributesA
HeapReAlloc
GetFileSize
GetStdHandle
FindClose
HeapFree
TlsGetValue
GetTickCount
CreateFileMappingA
FormatMessageW
GetCurrentDirectoryA
GetTimeZoneInformation
CreateFileA
InterlockedDecrement
lstrlenA
SetCurrentDirectoryA
FreeEnvironmentStringsA
GetEnvironmentStrings
HeapCreate
WaitForSingleObject
GetModuleFileNameA
CreateFileW
FreeLibrary
GetModuleHandleA
GetStartupInfoA
GetCurrentThreadId
LockResource
GlobalAlloc
VirtualQuery
GetOEMCP
UnhandledExceptionFilter
GetDriveTypeA
GetSystemDirectoryA
SetErrorMode
GetCurrentProcess
GetACP
GetConsoleCP
SetHandleCount
GetConsoleOutputCP
MapViewOfFile
GetLocaleInfoA
CompareStringA
MultiByteToWideChar
SetFilePointer
TlsAlloc
CreateEventA
GetWindowsDirectoryA
GetCurrentThread
LoadLibraryA
GetConsoleMode
CreateThread
GetLastError
GlobalLock
HeapSize
GetCurrentProcessId
LeaveCriticalSection
InitializeCriticalSection
ExitProcess
GetCPInfo
GetStringTypeW
GetSystemInfo
SetEndOfFile
DeleteCriticalSection
GetCommandLineA
DeleteFileW
InterlockedExchange
LoadResource
DeleteFileA
FreeEnvironmentStringsW
FileTimeToLocalFileTime
QueryPerformanceCounter
VirtualAlloc
TlsSetValue
oleaut32
SysAllocStringLen
SysAllocString
VariantClear
advapi32
RegQueryValueExA
RegCloseKey
RegSetValueExA
RegDeleteKeyA
OpenProcessToken
RegDeleteValueA
gdi32
SelectObject
GetDeviceCaps
DeleteObject
CreateCompatibleDC
CreateSolidBrush
SetBkColor
GetStockObject
user32
DestroyWindow
SetWindowTextA
SetWindowPos
SendMessageA
MoveWindow
PostQuitMessage
DispatchMessageA
DrawTextA
CallWindowProcA
GetCursorPos
IsWindow
SetForegroundWindow
GetWindowRect
FillRect
ScreenToClient
KillTimer
SetTimer
InvalidateRect
GetWindowLongA
UpdateWindow
SetCursor
LoadStringA
ReleaseDC
GetSysColor
LoadIconA
CheckMenuItem
ShowWindow
DefWindowProcA
PeekMessageA
MessageBoxA
ReleaseCapture
IsWindowEnabled
RegisterClassA
GetMessageA
GetParent
GetFocus
GetDC
TranslateMessage
EnableMenuItem
SystemParametersInfoA
GetClientRect
CreateWindowExA
GetSubMenu
GetWindow
GetSystemMetrics
PostMessageA
GetDlgItem
EndPaint
SetFocus
GetActiveWindow
BeginPaint
Sections
ycqgi Size: 416KB - Virtual size: 413KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE