Static task
static1
Behavioral task
behavioral1
Sample
99e3fc3496c1ae46ee8b9cd0e0f157c6.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
99e3fc3496c1ae46ee8b9cd0e0f157c6.exe
Resource
win10v2004-20231215-en
General
-
Target
99e3fc3496c1ae46ee8b9cd0e0f157c6
-
Size
2.7MB
-
MD5
99e3fc3496c1ae46ee8b9cd0e0f157c6
-
SHA1
5e367d1fe7a3e49942046648f77422a24dcc96a5
-
SHA256
6171fc784ba8f63b5875894cd49c4cd053c37f6e5f62b2b012e71ae5e90512d7
-
SHA512
0209236c759d3c41c93dffb8bc7b45c5865bd5ff201086a2591ad6737e5e1648424c3141a2cc050e7d70ea92b7d4a3ead65dac1441b46b6cd4c724fbedd1c868
-
SSDEEP
49152:0AeM1xlgymYSDQ12YqKycnJ5cU66rbLgaa2L2ynBR7YSy169RbiV0wKzlSC:RbxGFDsprfBLg+pR7Yz1QRbiV0pzd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 99e3fc3496c1ae46ee8b9cd0e0f157c6
Files
-
99e3fc3496c1ae46ee8b9cd0e0f157c6.exe windows:4 windows x86 arch:x86
ae1279b3906718d116c0bcbf6f8bdf12
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
ord17
kernel32
CreateDirectoryA
SetEnvironmentVariableA
CompareStringW
CompareStringA
VirtualQuery
LocalFileTimeToFileTime
RemoveDirectoryA
IsBadCodePtr
IsBadReadPtr
LoadLibraryA
FlushFileBuffers
GetOEMCP
GetACP
GetModuleHandleA
GetModuleFileNameA
GetDiskFreeSpaceA
CopyFileA
GetProcAddress
MultiByteToWideChar
MulDiv
VirtualProtect
Sleep
CloseHandle
SetFileAttributesA
SetFileTime
CreateFileA
DosDateTimeToFileTime
GetSystemInfo
GetLocaleInfoA
GetCPInfo
GetStringTypeW
GetStringTypeA
InitializeCriticalSection
FindClose
FindFirstFileA
FindNextFileA
DeleteFileA
HeapFree
GetLastError
GetFileType
HeapAlloc
ReadFile
SetFilePointer
WriteFile
ExitThread
TlsSetValue
TlsGetValue
ResumeThread
CreateThread
GetStartupInfoA
GetCommandLineA
GetVersionExA
RtlUnwind
RaiseException
ExitProcess
HeapReAlloc
HeapDestroy
HeapCreate
VirtualFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
IsBadWritePtr
SetEndOfFile
SetHandleCount
GetStdHandle
SetStdHandle
TerminateProcess
GetCurrentProcess
HeapSize
TlsFree
SetLastError
GetCurrentThreadId
TlsAlloc
GetFileAttributesA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetUnhandledExceptionFilter
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LCMapStringA
LCMapStringW
user32
DialogBoxParamA
LoadImageA
SetWindowTextA
EndPaint
SetTimer
FillRect
GetClientRect
SendMessageA
BeginPaint
GetDC
GetWindowTextA
MessageBoxA
ReleaseDC
GetDlgItem
EndDialog
GetDesktopWindow
EnumChildWindows
GetSysColorBrush
IsDlgButtonChecked
gdi32
SetTextColor
DeleteDC
CreateFontA
GetDeviceCaps
SetBkColor
DeleteObject
SelectObject
CreateCompatibleDC
GetObjectA
CreateSolidBrush
BitBlt
advapi32
RegSetValueExA
RegCloseKey
RegOpenKeyExA
RegCreateKeyExA
RegQueryValueExA
shell32
ShellExecuteA
SHGetMalloc
SHGetPathFromIDListA
SHBrowseForFolderA
ole32
CoUninitialize
CoInitialize
CoCreateInstance
Sections
.text Size: 116KB - Virtual size: 114KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ