Static task
static1
Behavioral task
behavioral1
Sample
999e1c361f0aad1ae56904c70dc13bcb.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
999e1c361f0aad1ae56904c70dc13bcb.exe
Resource
win10v2004-20231215-en
General
-
Target
999e1c361f0aad1ae56904c70dc13bcb
-
Size
644KB
-
MD5
999e1c361f0aad1ae56904c70dc13bcb
-
SHA1
c8ffdb6ce830a575893088d3ae3b029744981e3f
-
SHA256
810bd7356c1d042d0be7491938448c99799777d40ae1a816e44c282f7a719e85
-
SHA512
5f71fa916f1b14cc000ebb3ca7dced6759dcfe7ddad3e2bbc5ddd192addfa72921e06ca46a5f19d8a94fcea8a6f67352ede2d3744934606e0cdb98b3fff55168
-
SSDEEP
12288:K1gX9XmIXMcmVoUtzBhprpAd2nw0cnPj7hvNb/1oLfo2:K1ucBoUtzBPrpAPPjhNb1oLfo
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 999e1c361f0aad1ae56904c70dc13bcb
Files
-
999e1c361f0aad1ae56904c70dc13bcb.exe windows:5 windows x64 arch:x64
ae2b1fa18004c5b721950483a096bdfe
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
HeapFree
HeapQueryInformation
HeapReAlloc
HeapSize
EncodePointer
DecodePointer
FlsGetValue
FlsSetValue
FlsFree
FlsAlloc
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlCaptureContext
GetStdHandle
InitializeCriticalSectionAndSpinCount
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapAlloc
GetFileType
HeapSetInformation
HeapCreate
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
GetACP
IsValidCodePage
GetConsoleCP
GetConsoleMode
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetStartupInfoA
GetCommandLineA
GetProcessHeap
RtlPcToFileHeader
RaiseException
RtlUnwindEx
RtlLookupFunctionEntry
SetErrorMode
GetModuleHandleW
GetCurrentProcess
FlushFileBuffers
SetFilePointer
WritePrivateProfileStringA
GetOEMCP
GetCPInfo
TlsFree
LocalReAlloc
TlsSetValue
GlobalHandle
GlobalReAlloc
TlsAlloc
TlsGetValue
LocalAlloc
FormatMessageA
LocalFree
GlobalFlags
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
GetModuleFileNameW
GetFileAttributesA
GlobalFree
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetModuleFileNameA
GetLocaleInfoA
GlobalAlloc
FreeResource
GetCurrentThreadId
GlobalFindAtomA
GlobalDeleteAtom
FreeLibrary
CompareStringA
lstrcmpW
GetVersionExA
GetCurrentProcessId
GlobalGetAtomNameA
GlobalAddAtomA
GetLastError
MultiByteToWideChar
GlobalLock
GlobalUnlock
MulDiv
GetModuleHandleA
SetLastError
lstrlenA
lstrcmpA
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
SizeofResource
DeleteFileA
Sleep
LoadLibraryA
GetProcAddress
ExitProcess
CreateFileA
WriteFile
SetHandleCount
CloseHandle
user32
GetSysColorBrush
CreateDialogIndirectParamA
GetNextDlgTabItem
EndDialog
GetMessageA
TranslateMessage
ValidateRect
PostQuitMessage
SetWindowTextA
IsDialogMessageA
RegisterWindowMessageA
SendDlgItemMessageA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassLongPtrA
SetPropA
GetPropA
RemovePropA
GetWindowTextA
GetForegroundWindow
DispatchMessageA
GetTopWindow
DestroyWindow
GetWindowLongPtrA
SetWindowLongPtrA
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
UnregisterClassA
GetClassInfoExA
RegisterClassA
AdjustWindowRectEx
DefWindowProcA
CallWindowProcA
SystemParametersInfoA
GetWindowPlacement
GetSystemMetrics
GetCursorPos
CreateWindowExA
GetClientRect
GetWindowRect
PtInRect
GetClassNameA
DestroyMenu
WinHelpA
SetWindowPos
SetFocus
GetWindowThreadProcessId
GetActiveWindow
IsWindowEnabled
GetDlgItem
EnableWindow
LoadCursorA
SetCursor
GetDlgCtrlID
GetKeyState
LoadIconA
PeekMessageA
SetActiveWindow
IsWindowVisible
UpdateWindow
IsIconic
GetSubMenu
GetMenuItemID
GetMenuItemCount
GetCapture
CheckMenuItem
EnableMenuItem
GetMenuState
ModifyMenuA
SendMessageA
GetParent
GetFocus
LoadBitmapA
GetMenuCheckMarkDimensions
SetMenuItemBitmaps
TabbedTextOutA
DrawTextA
DrawTextExA
GrayStringA
ClientToScreen
GetDC
ReleaseDC
BeginPaint
GetClassInfoA
CopyRect
GetMenu
GetLastActivePopup
PostMessageA
SetMenu
GetDesktopWindow
GetWindowLongA
ShowWindow
GetWindow
IsWindow
GetSysColor
EndPaint
MessageBoxA
gdi32
GetDeviceCaps
GetStockObject
DeleteDC
SetViewportExtEx
ScaleWindowExtEx
SetWindowExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetObjectA
DeleteObject
GetClipBox
SetMapMode
SetTextColor
SetBkColor
RestoreDC
SaveDC
CreateBitmap
ScaleViewportExtEx
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
advapi32
RegSetValueExA
RegCreateKeyExA
RegQueryValueA
RegOpenKeyA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
shell32
SHChangeNotify
shlwapi
PathFindFileNameA
PathFindExtensionA
ole32
CoUninitialize
CoInitialize
CoCreateInstance
oleaut32
VariantClear
VariantInit
VariantChangeType
Sections
.text Size: 164KB - Virtual size: 163KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 56KB - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 391KB - Virtual size: 414KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 20KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ