Static task
static1
Behavioral task
behavioral1
Sample
997cf23e8b8d9906dc9517671a106b9a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
997cf23e8b8d9906dc9517671a106b9a.exe
Resource
win10v2004-20231215-en
General
-
Target
997cf23e8b8d9906dc9517671a106b9a
-
Size
442KB
-
MD5
997cf23e8b8d9906dc9517671a106b9a
-
SHA1
a00417b28852444c889620a3b82e5d977aea35c9
-
SHA256
2f384913553d7b75017ba266e74653f5d11d6d5e99a053fd249b9e378058b041
-
SHA512
4c8152508f28341712dedc6c2d9b31f6c52f58216ea88216250f1733f8256c3ecbef8048f89437ee9b6e029a1b128b0d9fbe47183952f853bd9f0ac7119da2fe
-
SSDEEP
12288:njr4bYtadrMD9TBBqNXE0YDO1v9Sw804vTJzr1:njcFdrMcXzYDOZcd045
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 997cf23e8b8d9906dc9517671a106b9a
Files
-
997cf23e8b8d9906dc9517671a106b9a.exe windows:5 windows x86 arch:x86
2ceaf8fd8fa93d145f17895fcc1ed527
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
wsprintfW
CharLowerW
wsprintfA
CharNextW
CloseDesktop
GetThreadDesktop
SetThreadDesktop
OpenDesktopW
SetWindowPos
MapWindowPoints
GetClientRect
GetWindowRect
GetDesktopWindow
SetProcessWindowStation
OpenWindowStationW
GetProcessWindowStation
CloseWindowStation
SetDlgItemTextW
EndDialog
DialogBoxParamW
LoadStringW
kernel32
GetCurrentDirectoryA
GetCurrentDirectoryW
GetTempPathA
GetTempPathW
GetTempFileNameA
GetTempFileNameW
SetLastError
LoadLibraryExW
FormatMessageW
GetModuleFileNameA
CreateFileA
DeleteFileA
OutputDebugStringA
OutputDebugStringW
CreateMutexW
GetModuleHandleW
GetFileAttributesA
CreateFileMappingA
CreateProcessW
IsDBCSLeadByte
WaitForSingleObject
GetModuleHandleA
IsBadWritePtr
lstrcmpiA
MapViewOfFileEx
IsBadReadPtr
VirtualAlloc
VirtualFree
HeapFree
GetProcessHeap
HeapAlloc
SetEndOfFile
FlushFileBuffers
TlsAlloc
CompareStringW
CompareStringA
GetVersionExA
CopyFileW
MoveFileExW
FindFirstFileW
FindNextFileW
FindClose
GetFileAttributesW
CreateDirectoryW
OpenFileMappingA
GetSystemInfo
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
QueryPerformanceCounter
SetFilePointer
lstrcatW
LocalFree
WideCharToMultiByte
lstrlenA
FindResourceW
LoadResource
GetSystemDefaultUILanguage
GetExitCodeProcess
lstrcmpW
FindResourceExW
LockResource
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GetLastError
GetSystemDirectoryW
DisableThreadLibraryCalls
GetModuleFileNameW
ReleaseMutex
SetFileAttributesW
GetLocalTime
DebugBreak
GetThreadContext
IsDebuggerPresent
GetWindowsDirectoryW
lstrcatA
lstrcpyA
VirtualQueryEx
GetComputerNameW
GetLongPathNameW
WriteFile
lstrlenW
lstrcpyW
ReadFile
InterlockedCompareExchange
InterlockedIncrement
GetCurrentProcess
LeaveCriticalSection
EnterCriticalSection
InterlockedDecrement
CloseHandle
GetCurrentThread
lstrcpynW
FreeLibrary
MultiByteToWideChar
GetProcAddress
LoadLibraryW
ExpandEnvironmentStringsW
lstrcmpiW
GetSystemDefaultLCID
GlobalFree
GlobalAlloc
Sleep
GlobalMemoryStatusEx
GetTickCount
UnmapViewOfFile
MapViewOfFile
CreateFileMappingW
SearchPathW
CreateFileW
MoveFileW
DeleteFileW
advapi32
SaferSetLevelInformation
SaferIdentifyLevel
SaferGetLevelInformation
SaferCloseLevel
AddAccessAllowedAceEx
AddAce
GetAce
SetSecurityDescriptorControl
RegisterEventSourceW
ReportEventW
DeregisterEventSource
RegSetKeySecurity
RegGetKeySecurity
RegNotifyChangeKeyValue
RegFlushKey
RegConnectRegistryW
GetSecurityDescriptorLength
BuildTrusteeWithSidW
GetSecurityDescriptorDacl
GetAclInformation
GetEffectiveRightsFromAclW
SaferCreateLevel
RegDeleteValueW
RegCreateKeyExW
RegCreateKeyExA
RegSetValueExA
RegDeleteKeyA
RegOpenKeyExA
RegQueryValueExA
RegEnumValueW
RegQueryInfoKeyW
RegSetValueExW
AllocateAndInitializeSid
AddAccessAllowedAce
FreeSid
ConvertSidToStringSidW
OpenProcessToken
InitializeSecurityDescriptor
InitializeAcl
SetSecurityDescriptorOwner
SetSecurityDescriptorGroup
SetSecurityDescriptorDacl
OpenThreadToken
GetTokenInformation
RegQueryValueExW
GetLengthSid
RegEnumKeyExW
RegOpenKeyExW
RegCloseKey
RegDeleteKeyW
ole32
OleSaveToStream
WriteClassStm
OleLoadFromStream
CoGetMalloc
CLSIDFromString
CreateStreamOnHGlobal
CoSetProxyBlanket
StringFromCLSID
CoTaskMemRealloc
CoCreateInstanceEx
CoCreateInstance
StringFromGUID2
CoCreateGuid
CoGetObjectContext
CoImpersonateClient
CoRevertToSelf
CoTaskMemFree
CoTaskMemAlloc
oleaut32
SysFreeString
VariantInit
SafeArrayCreateVector
SysStringByteLen
SysAllocStringByteLen
VariantChangeType
SysAllocStringLen
VariantClear
SysAllocString
LoadRegTypeLi
LoadTypeLibEx
msvcrt
free
??1type_info@@UAE@XZ
_onexit
__dllonexit
?terminate@@YAXXZ
_adjust_fdiv
_initterm
_wstrdate
_wstrtime
_waccess
wcstombs
mbstowcs
_ltow
_wtol
towupper
_wcslwr
wcsstr
wcstol
swprintf
_ultoa
_vsnwprintf
malloc
realloc
memmove
_snprintf
wcscmp
_wcsnicmp
qsort
_i64tow
_snwprintf
_purecall
wcsncpy
wcsrchr
wcscpy
wcscat
_wcsicmp
__CxxFrameHandler
wcslen
_except_handler3
wcschr
rpcrt4
UuidFromStringW
version
VerQueryValueW
Sections
.text Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 213KB - Virtual size: 216KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.KAJS Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.KEJS Size: 206KB - Virtual size: 208KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 12KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ