Static task
static1
Behavioral task
behavioral1
Sample
98c710a281881ba0b21e02a64adaf730.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
98c710a281881ba0b21e02a64adaf730.exe
Resource
win10v2004-20231215-en
General
-
Target
98c710a281881ba0b21e02a64adaf730
-
Size
116KB
-
MD5
98c710a281881ba0b21e02a64adaf730
-
SHA1
0e5c43f97bdbc809e6a8bf2a50940ef08f83a2c9
-
SHA256
0b1f3847a3e8bb8078a2a0d6b5457e446503752381faaa1d30197c2eda036ec3
-
SHA512
04a05a5f9039d6090ae334c39b13df8d2ad58d80496bc92d51fe1e8a38dd8414fa0551352a8be252f0515f5c49e7d8c3ddac52f528f7559d2cf13a7aade3bce2
-
SSDEEP
1536:kmXwYx33kHBjTh4abD+murSKvbvZjYDATWhmKv4LDwKgEdP60K9CxwCPJ:kmAYxHkHB3+MurSKzZ2v0pdP60w2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 98c710a281881ba0b21e02a64adaf730
Files
-
98c710a281881ba0b21e02a64adaf730.exe windows:4 windows x86 arch:x86
c7976f5b67547b28ba9a38042d12f374
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetACP
RaiseException
GetProcAddress
ExitThread
GetOEMCP
lstrcmpiA
GlobalAlloc
GetLastError
GetVersionExA
GetModuleHandleA
CloseHandle
GetCommandLineA
lstrlenA
ExitProcess
VirtualAlloc
comctl32
ImageList_DragShowNolock
shell32
SHGetDiskFreeSpaceA
SHGetFileInfoA
gdi32
SelectObject
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerInstallFileA
advapi32
RegCreateKeyExA
RegDeleteKeyA
user32
GetClipboardData
DestroyMenu
MapVirtualKeyA
EnableWindow
DestroyWindow
RedrawWindow
EnableMenuItem
GetScrollRange
PostMessageA
ShowWindow
CharUpperBuffA
LoadKeyboardLayoutA
UnhookWindowsHookEx
EnumChildWindows
EnumThreadWindows
PtInRect
CharNextW
MessageBeep
GetMenuItemCount
AdjustWindowRectEx
UnregisterClassA
GetWindowThreadProcessId
EmptyClipboard
GetCursor
GetWindowRect
IsRectEmpty
GetDlgItem
DestroyIcon
GetKeyboardState
ScreenToClient
GetKeyboardType
SetActiveWindow
ShowOwnedPopups
SetWindowLongA
CharToOemA
SetCapture
ActivateKeyboardLayout
SetTimer
GetSysColorBrush
TrackPopupMenu
DrawMenuBar
OffsetRect
GetClassNameA
EqualRect
GetMenu
DefWindowProcA
OpenClipboard
SetMenu
GetScrollPos
IsChild
CharLowerA
LoadIconA
DestroyCursor
SetForegroundWindow
GetFocus
SendMessageW
InsertMenuA
SetWindowPlacement
DrawEdge
IsDialogMessageW
DefMDIChildProcA
SetScrollPos
InsertMenuItemA
GetWindowLongA
GetCursorPos
GetDesktopWindow
CreatePopupMenu
TranslateMessage
WaitMessage
SetWindowsHookExA
SetPropA
GetMessagePos
GetWindowLongW
MessageBoxA
ChildWindowFromPoint
CreateIcon
CallWindowProcA
WindowFromPoint
SetFocus
ReleaseCapture
GetActiveWindow
LoadBitmapA
RemoveMenu
GetSystemMenu
GetClassLongA
SetMenuItemInfoA
CharLowerBuffA
GetClassInfoA
SetScrollInfo
IsZoomed
SetCursor
LoadCursorA
BeginPaint
FillRect
RemovePropA
IntersectRect
SetWindowLongW
GetWindowPlacement
ole32
CoCreateInstanceEx
PropVariantClear
Sections
CODE Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.tls Size: 79KB - Virtual size: 79KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DATA Size: 1024B - Virtual size: 932B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
BSS Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ