Static task
static1
Behavioral task
behavioral1
Sample
9b6b574a1af2049799b80568bdcfa198.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9b6b574a1af2049799b80568bdcfa198.exe
Resource
win10v2004-20231215-en
General
-
Target
9b6b574a1af2049799b80568bdcfa198
-
Size
108KB
-
MD5
9b6b574a1af2049799b80568bdcfa198
-
SHA1
077d967a2d48285c26a8e09bfc0af447af0a79c0
-
SHA256
e3811ef57c705a7a4dfb7ef4afc94f31eb6e6693f64feab8fdd1f7920b6b206f
-
SHA512
1023a7accf4af2657a76d90b995ab8482cf6f7eb64782e2aee08375f99973f9216446fbab0138e8580b11750a0ee1c14e6dbe9247d253e324365d3d834e17e5a
-
SSDEEP
1536:IDMTJO0s6ikOL2/z4a5EkkDLWaabE7iCoEswhYxTA2lAZo:IwKeBWEkuCo7wK1Jlyo
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 9b6b574a1af2049799b80568bdcfa198
Files
-
9b6b574a1af2049799b80568bdcfa198.exe windows:4 windows x86 arch:x86
6aeb99af2a69e6665d2399043c61aadf
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrlenA
LocalFree
lstrcpynA
LocalAlloc
GlobalFree
GlobalUnlock
GlobalHandle
GlobalLock
GlobalReAlloc
GlobalAlloc
LocalReAlloc
CloseHandle
lstrcpyA
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
lstrcmpiA
GlobalGetAtomNameA
lstrcatA
FreeLibrary
lstrcmpA
GlobalFlags
SetFilePointer
FlushFileBuffers
RaiseException
InterlockedIncrement
InterlockedDecrement
LoadLibraryA
GetProcAddress
IsBadWritePtr
HeapReAlloc
VirtualAlloc
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
MultiByteToWideChar
HeapAlloc
WriteFile
RtlUnwind
HeapFree
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentVariableA
GetLastError
TlsGetValue
SetLastError
SetStdHandle
TlsAlloc
TlsSetValue
GetCurrentThreadId
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetModuleFileNameA
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetOEMCP
GetACP
GetCPInfo
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
ExitProcess
GetVersion
GetCommandLineA
GetStartupInfoA
GetModuleHandleA
HeapSize
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
Sleep
GetProcessVersion
GetVersionExA
user32
GetClientRect
AdjustWindowRectEx
SetFocus
GetSysColor
MapWindowPoints
LoadIconA
SetWindowTextA
LoadCursorA
GetSysColorBrush
ReleaseDC
GetDC
PtInRect
ClientToScreen
PostQuitMessage
DestroyMenu
TabbedTextOutA
DrawTextA
GrayStringA
GetTopWindow
GetCapture
WinHelpA
GetClassInfoA
RegisterClassA
GetMenu
CopyRect
GetSubMenu
GetMenuItemID
GetDlgItem
GetWindowTextA
GetDlgCtrlID
DefWindowProcA
DestroyWindow
CreateWindowExA
GetClassLongA
SetPropA
GetPropA
CallWindowProcA
RemovePropA
GetMessageTime
GetMessagePos
GetForegroundWindow
SetForegroundWindow
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetSystemMetrics
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
DispatchMessageA
GetKeyState
CallNextHookEx
PeekMessageA
SetWindowsHookExA
GetParent
GetLastActivePopup
PostMessageA
GetClassNameA
GetWindow
GetDesktopWindow
GetWindowLongA
FindWindowExA
IsWindowEnabled
SendMessageA
MessageBoxA
EnableWindow
UnhookWindowsHookEx
GetMenuItemCount
LoadStringA
advapi32
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
comctl32
ord17
gdi32
DeleteObject
GetDeviceCaps
DeleteDC
SaveDC
RestoreDC
SelectObject
GetStockObject
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetObjectA
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
Sections
.text Size: 56KB - Virtual size: 54KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE