Static task
static1
Behavioral task
behavioral1
Sample
9ba435af05c50ea3397a0e78007951be.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9ba435af05c50ea3397a0e78007951be.exe
Resource
win10v2004-20231215-en
General
-
Target
9ba435af05c50ea3397a0e78007951be
-
Size
80KB
-
MD5
9ba435af05c50ea3397a0e78007951be
-
SHA1
0ea34f3f45794c7c9c9ccaa638d04b2eee991a06
-
SHA256
25faf7361759b6323e87acf00b61372995abd6042396f206f890c2e5853efcb7
-
SHA512
44437955dd28fd0a83f1bbb9376e2a950d7e0a9ea4d10e40622b5a36d126e3f68a9f35a57f02fd28c0558f98c6d13cd1bd1316f7887c155d979f482117fbea1c
-
SSDEEP
1536:9hGmvb+p11Y98ebTxVagMmtLJGtU38Xg81mgnhNb8m/Cv5j1:KxeegpJGt0SVmghNb8m/Cv5j1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 9ba435af05c50ea3397a0e78007951be
Files
-
9ba435af05c50ea3397a0e78007951be.exe windows:4 windows x86 arch:x86
27bee5a2a527929817f294eb625a020e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
GetUserNameA
CopySid
GetLengthSid
GetTokenInformation
InitializeSecurityDescriptor
GetSecurityDescriptorDacl
GetAce
AddAce
InitializeAcl
GetAclInformation
SetSecurityDescriptorDacl
EqualSid
AddAccessAllowedAce
DeleteAce
CreateProcessAsUserA
RegSetValueExA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
InitiateSystemShutdownA
AccessCheck
MapGenericMask
GetFileSecurityA
RevertToSelf
ImpersonateSelf
OpenThreadToken
RegCreateKeyExA
GetSecurityInfo
DuplicateToken
user32
PostQuitMessage
MessageBoxA
GetDesktopWindow
LoadStringA
KillTimer
SetTimer
GetUserObjectSecurity
SetUserObjectSecurity
CloseDesktop
ExitWindowsEx
OpenInputDesktop
GetUserObjectInformationA
GetProcessWindowStation
OpenWindowStationA
SetProcessWindowStation
OpenDesktopA
CloseWindowStation
SetSystemCursor
InflateRect
LoadRemoteFonts
ChangeClipboardChain
IsWinEventHookInstalled
MenuWindowProcW
LoadMenuA
SendDlgItemMessageA
SetMessageExtraInfo
FlashWindowEx
RegisterLogonProcess
DdeInitializeA
SetDeskWallpaper
DlgDirListA
RealChildWindowFromPoint
LoadKeyboardLayoutA
DrawTextW
GetProcessDefaultLayout
AnimateWindow
GetMenuItemInfoW
PrivateExtractIconsA
GetClientRect
UnpackDDElParam
CallMsgFilter
MessageBoxIndirectA
IsWindowEnabled
CloseClipboard
LoadMenuW
DdeGetLastError
MB_GetString
EndPaint
LockWindowUpdate
GetDlgItemInt
RegisterDeviceNotificationA
SetCaretBlinkTime
GetRawInputBuffer
IsCharAlphaNumericW
RegisterDeviceNotificationW
CharNextA
CheckDlgButton
SetClassLongW
GetWindowContextHelpId
DialogBoxIndirectParamAorW
CharPrevA
SetPropW
GetClipboardOwner
LoadMenuIndirectA
VkKeyScanW
FindWindowA
FrameRect
GetMenuContextHelpId
ole32
CoTaskMemFree
CoSetProxyBlanket
CoInitialize
CoCreateInstance
CoQueryProxyBlanket
CoUninitialize
version
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
kernel32
SetEnvironmentVariableA
CompareStringW
CompareStringA
SetStdHandle
HeapSize
VirtualProtect
GetLocaleInfoA
InitializeCriticalSection
GetStringTypeW
GetStringTypeA
InterlockedExchange
GetOEMCP
GetACP
LCMapStringW
LCMapStringA
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetStdHandle
TlsFree
OutputDebugStringA
FindClose
FindNextFileA
FindFirstFileA
GetLastError
GetModuleFileNameA
GetModuleHandleA
WaitForMultipleObjectsEx
SetConsoleCtrlHandler
QueryPerformanceCounter
GetProcAddress
GetSystemInfo
FreeLibrary
LoadLibraryA
GetCurrentProcess
GetCurrentThread
CloseHandle
OpenProcess
WaitForSingleObject
FileTimeToSystemTime
TerminateProcess
GetExitCodeProcess
CreateProcessA
DuplicateHandle
GetTickCount
GetVersionExA
IsBadReadPtr
VirtualQuery
GetCurrentThreadId
CreateFileA
GetCurrentProcessId
TlsSetValue
TlsGetValue
RaiseException
SetUnhandledExceptionFilter
TlsAlloc
FormatMessageA
MoveFileExA
CreateDirectoryA
RemoveDirectoryA
Sleep
GetFileInformationByHandle
GetFileAttributesA
GetTempPathA
GetFileType
SetEndOfFile
SetFilePointer
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
GetFileSize
GetWindowsDirectoryA
GetDriveTypeA
GetDiskFreeSpaceA
SetLastError
WriteFile
ReadFile
FlushFileBuffers
GetVersion
DeleteFileA
MoveFileA
WideCharToMultiByte
MultiByteToWideChar
GetFullPathNameA
CreateEventA
SetEvent
LocalFree
GetSystemTimeAsFileTime
GetFileAttributesW
GetVolumeInformationW
GetLogicalDriveStringsW
FindNextFileW
FindFirstFileW
CreateDirectoryW
CreateFileW
GetOverlappedResult
CreateEventW
DeleteFileW
RemoveDirectoryW
CopyFileW
MoveFileExW
GetModuleHandleW
HeapFree
HeapAlloc
GetStartupInfoA
GetCommandLineA
GetTimeZoneInformation
RtlUnwind
GetCurrentDirectoryA
FileTimeToLocalFileTime
HeapReAlloc
EnterCriticalSection
LeaveCriticalSection
ExitProcess
HeapDestroy
HeapCreate
VirtualFree
DeleteCriticalSection
VirtualAlloc
lstrlenA
LoadLibraryExA
apphelp
SdbGetStandardDatabaseGUID
GetPermLayers
ApphelpCheckMsiPackage
SdbFindFirstTagRef
SdbReadEntryInformation
SdbOpenDatabase
SdbReadStringTag
SdbGetBinaryTagData
SdbFindNextTagRef
Sections
.text Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 54KB - Virtual size: 6.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 520B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ