Static task
static1
Behavioral task
behavioral1
Sample
993418b65e721016279699fcf56f0596.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
993418b65e721016279699fcf56f0596.exe
Resource
win10v2004-20231215-en
General
-
Target
993418b65e721016279699fcf56f0596
-
Size
140KB
-
MD5
993418b65e721016279699fcf56f0596
-
SHA1
9e85bd7809aedb2b6dfecb85a6c01bf62f9e79a3
-
SHA256
25c640ae13a642bd04a768f1898ffebc0d6c7f8530441333a8aa72864d409399
-
SHA512
ce5a549655c2441452acf7922e19d8cf740d48af709a580ad9afa5508471cba5ad6955d39025a9714929af97d4147a260ff92c723106132ff350259fecd2e01e
-
SSDEEP
3072:b01V/GHyO/qbRM1O9wKT3zpFxdQQqVaD+ol:bUV/GHyyqRN3XQQq1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 993418b65e721016279699fcf56f0596
Files
-
993418b65e721016279699fcf56f0596.exe windows:4 windows x86 arch:x86
6954def52cb23668b97783c1cb71ba5f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindFirstFileA
FindNextFileA
FindClose
FreeLibrary
LocalFree
GetVersionExA
MapViewOfFile
UnmapViewOfFile
ExitProcess
CreateFileA
SystemTimeToFileTime
SetFileTime
SetEnvironmentVariableA
CompareStringW
CompareStringA
OpenProcess
SetEndOfFile
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
IsBadCodePtr
FlushFileBuffers
SetStdHandle
GetSystemInfo
VirtualProtect
InitializeCriticalSection
GetOEMCP
GetACP
GetLocaleInfoA
CopyFileA
GetModuleFileNameA
Sleep
DeleteFileA
GetProcAddress
LoadLibraryA
WideCharToMultiByte
InterlockedDecrement
CreateMutexA
CloseHandle
GetLastError
ReleaseMutex
FormatMessageA
GetCPInfo
GetStringTypeW
GetStringTypeA
SetUnhandledExceptionFilter
VirtualQuery
InterlockedExchange
IsBadWritePtr
VirtualAlloc
SetFilePointer
ReadFile
GetTimeZoneInformation
LCMapStringW
LCMapStringA
EnterCriticalSection
LeaveCriticalSection
VirtualFree
HeapDestroy
DeleteCriticalSection
MultiByteToWideChar
lstrlenA
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetSystemTimeAsFileTime
IsBadReadPtr
HeapFree
HeapAlloc
RtlUnwind
RaiseException
TlsAlloc
SetLastError
GetCurrentThreadId
TlsFree
TlsSetValue
TlsGetValue
HeapReAlloc
TerminateProcess
GetCurrentProcess
HeapSize
WriteFile
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapCreate
user32
PostQuitMessage
GetMessageA
TranslateAcceleratorA
TranslateMessage
DispatchMessageA
SetWindowTextA
PostMessageA
SetTimer
EnumWindows
EnumChildWindows
GetWindowThreadProcessId
GetClassNameA
FindWindowA
DefWindowProcA
EndPaint
BeginPaint
UpdateWindow
ShowWindow
MessageBoxA
CreateWindowExA
RegisterClassExA
advapi32
RegCreateKeyExA
RegQueryValueExA
RegSetValueExA
RegEnumKeyA
RegEnumValueA
RegQueryInfoKeyA
RegOpenKeyExA
RegCloseKey
SetSecurityInfo
SetEntriesInAclA
GetSecurityInfo
shell32
ShellExecuteA
ole32
CoCreateGuid
CoCreateInstance
CoInitializeEx
oleaut32
SysAllocString
VariantClear
SysFreeString
userenv
GetProfilesDirectoryA
urlmon
CreateURLMoniker
wininet
InternetReadFile
InternetOpenA
InternetSetOptionA
HttpQueryInfoA
InternetCloseHandle
InternetOpenUrlA
netapi32
Netbios
Sections
.text Size: 96KB - Virtual size: 95KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 36KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ