Static task
static1
Behavioral task
behavioral1
Sample
99be979d5a0cee621bd025fb8e4ff075.exe
Resource
win7-20231215-en
General
-
Target
99be979d5a0cee621bd025fb8e4ff075
-
Size
193KB
-
MD5
99be979d5a0cee621bd025fb8e4ff075
-
SHA1
50d51c6f5e930223373ac8e5150d2d42e20bd542
-
SHA256
c1bebc8efb6f570e0465464aafe78a7273df04a976dbdb20c8189f95134c23a9
-
SHA512
684d77dd58a6c7feb2150c2ad6a6cd5d142d4389cbb42927c5f76bd4599bb6b4c9bed582400545e37384529cd8a7b4219fd8c19a5f12d25a00b805bfd2913dbd
-
SSDEEP
6144:AMogsc4kLSyjes0q6byvfb/5E3MvYJSBg:AMUjYr6qfbBVYJH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 99be979d5a0cee621bd025fb8e4ff075
Files
-
99be979d5a0cee621bd025fb8e4ff075.exe windows:4 windows x86 arch:x86
baf4b5d4f0b13284a97c2c5e28553306
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WritePrivateProfileStringW
SetEndOfFile
SetFileTime
GetProcessHeap
GetThreadPriority
WritePrivateProfileSectionA
SetProcessWorkingSetSize
GetCurrentDirectoryW
SetConsoleTitleA
CompareStringW
GetTapeParameters
CreateIoCompletionPort
PeekConsoleInputW
MoveFileExA
GetUserDefaultLangID
WriteConsoleOutputCharacterA
SystemTimeToFileTime
IsBadReadPtr
GlobalFindAtomA
VirtualAlloc
GetOEMCP
ReleaseSemaphore
VirtualAllocEx
EnumCalendarInfoW
EnumResourceNamesA
lstrcmpA
GetAtomNameA
SetProcessAffinityMask
GetDriveTypeA
WritePrivateProfileStructA
EnumDateFormatsW
LocalAlloc
GetHandleInformation
GetCommModemStatus
GetNumberFormatW
CopyFileExW
RemoveDirectoryA
FindFirstFileW
CreateDirectoryW
ClearCommBreak
RemoveDirectoryW
ReadDirectoryChangesW
GetStringTypeExW
GetFullPathNameA
ConnectNamedPipe
ReadConsoleA
SetMailslotInfo
VirtualQuery
FileTimeToLocalFileTime
TlsGetValue
GetProfileStringA
LeaveCriticalSection
FlushFileBuffers
LocalSize
GlobalReAlloc
GetProcessTimes
ReadFileScatter
GetCurrentProcess
GetUserDefaultLCID
SetEvent
SearchPathW
EraseTape
_hread
GetEnvironmentVariableW
WaitNamedPipeA
CompareStringA
CreateProcessA
SetFileAttributesA
SetConsoleActiveScreenBuffer
GetFileAttributesExA
WriteProcessMemory
_lread
SetupComm
GetTempFileNameA
ExitProcess
user32
GetKeyNameTextW
GetScrollInfo
GetSystemMetrics
SystemParametersInfoA
GetCaretBlinkTime
GetUserObjectSecurity
DialogBoxIndirectParamW
ShowWindowAsync
PtInRect
TileWindows
TranslateAcceleratorW
AppendMenuW
RegisterClassW
GetNextDlgGroupItem
CreateCursor
SendMessageCallbackW
SetScrollRange
GetDCEx
SetWindowWord
CreateDesktopW
CopyIcon
GetTopWindow
BringWindowToTop
GetDoubleClickTime
CopyImage
SwitchToThisWindow
IsCharAlphaNumericA
gdi32
DeleteDC
GetOutlineTextMetricsA
SetBitmapBits
BeginPath
GetTextCharacterExtra
CreateCompatibleBitmap
GetFontLanguageInfo
PlayEnhMetaFileRecord
GetSystemPaletteEntries
CreateHalftonePalette
GetObjectW
GetTextExtentExPointW
GetTextCharsetInfo
ExtFloodFill
OffsetWindowOrgEx
EnumFontFamiliesExW
comdlg32
ChooseFontA
GetOpenFileNameA
ChooseFontW
advapi32
SetEntriesInAclW
RegDeleteValueA
AllocateLocallyUniqueId
RevertToSelf
CryptGetKeyParam
SetKernelObjectSecurity
StartServiceA
RegConnectRegistryW
InitializeSid
CreateProcessAsUserA
StartServiceCtrlDispatcherA
LookupAccountNameA
OpenEventLogW
GetLengthSid
DeleteAce
GetUserNameA
CryptSignHashW
SetTokenInformation
CryptAcquireContextA
CryptAcquireContextW
CryptVerifySignatureA
RegCreateKeyExW
CryptSetProvParam
CryptEncrypt
AbortSystemShutdownW
RegCreateKeyW
CryptDeriveKey
AllocateAndInitializeSid
RegOpenKeyExA
GetSidSubAuthorityCount
shell32
SHGetSpecialFolderPathW
SHFileOperationA
DragAcceptFiles
ole32
StgSetTimes
oleaut32
SysStringLen
SysFreeString
SafeArrayGetLBound
VariantCopy
SafeArrayRedim
SysAllocStringLen
comctl32
CreateToolbarEx
shlwapi
PathUnquoteSpacesW
UrlCreateFromPathW
SHAutoComplete
StrFormatByteSize64A
PathFindNextComponentW
StrCpyNW
PathIsNetworkPathW
StrPBrkW
StrRChrA
PathRemoveBackslashA
SHSetValueW
PathIsDirectoryA
PathAddBackslashA
PathAddBackslashW
StrRChrW
PathFileExistsW
PathRemoveBackslashW
SHCopyKeyA
StrTrimA
Sections
.text Size: 8KB - Virtual size: 112KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 160KB - Virtual size: 156KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ