Static task
static1
Behavioral task
behavioral1
Sample
d43b54c086b00ecef18cf12ae14ea24c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d43b54c086b00ecef18cf12ae14ea24c.exe
Resource
win10v2004-20240226-en
General
-
Target
d43b54c086b00ecef18cf12ae14ea24c
-
Size
471KB
-
MD5
d43b54c086b00ecef18cf12ae14ea24c
-
SHA1
164b56342f365d9eee3536abb595698ba2caec37
-
SHA256
6723fcc2e0d555b1c7cdd37d8e5e20cff6a61c09e5ceb976e665248165a1c1a9
-
SHA512
65013bee49bf8cc6d71ef8c4dc7bab04a99f483ad5aad30fef33a979beb0fc619f33c335949d86683fd68b9f5a9cd68370cb6a5b91982a0a9bd206cbe858b1ec
-
SSDEEP
12288:SxgxmpYkrIYAp9Q7MbSexvlgeMmKfZZt8vHESYK:Sxgxm+EMeexv2e5KfZbqYK
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d43b54c086b00ecef18cf12ae14ea24c
Files
-
d43b54c086b00ecef18cf12ae14ea24c.exe windows:4 windows x86 arch:x86
d1d7c61963de87a79f936df67d32e9b8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
InitCommonControlsEx
advapi32
CryptGetDefaultProviderW
RegSetKeySecurity
InitializeSecurityDescriptor
CryptGenRandom
CryptSetProviderW
LookupAccountSidA
CryptGenKey
CryptDeriveKey
RegFlushKey
RegOpenKeyExA
CryptHashSessionKey
CryptCreateHash
RegSaveKeyW
CryptDuplicateKey
LookupPrivilegeNameW
RegQueryInfoKeyW
LookupPrivilegeDisplayNameW
RegCreateKeyW
CryptSignHashA
RegDeleteKeyA
RegDeleteValueA
comdlg32
FindTextW
GetFileTitleA
ChooseFontA
FindTextA
kernel32
OpenMutexA
SetFilePointer
HeapCreate
GetCurrentThreadId
FindNextFileA
lstrcmpiW
WriteFileEx
GetSystemDefaultLCID
TerminateProcess
InterlockedDecrement
OpenFileMappingA
VirtualFree
FreeLibrary
RtlUnwind
WriteFile
GetLocalTime
GetFileType
FreeEnvironmentStringsA
SetStdHandle
GetStdHandle
SleepEx
CompareStringW
SetHandleCount
LCMapStringA
GetOEMCP
InterlockedExchange
TlsGetValue
LocalFileTimeToFileTime
EnumDateFormatsA
LeaveCriticalSection
CompareStringA
InitializeCriticalSection
LCMapStringW
HeapDestroy
WriteConsoleOutputAttribute
SetEnvironmentVariableA
DeleteCriticalSection
GetTimeZoneInformation
FreeEnvironmentStringsW
GetEnvironmentStrings
CloseHandle
ReadFile
GetCurrentThread
GetSystemTime
TlsAlloc
LoadLibraryA
GetCPInfo
WideCharToMultiByte
ExitProcess
GetCurrentProcessId
HeapFree
IsBadWritePtr
GetVersion
UnlockFileEx
GetModuleFileNameA
GetUserDefaultLangID
EnterCriticalSection
HeapAlloc
GetCurrentProcess
TlsFree
GetTickCount
UnhandledExceptionFilter
VirtualQuery
GetStartupInfoA
QueryPerformanceCounter
HeapReAlloc
GetExitCodeProcess
GetLastError
InterlockedIncrement
GetACP
VirtualAlloc
GetModuleHandleA
DebugBreak
MultiByteToWideChar
FlushFileBuffers
GetSystemTimeAsFileTime
GlobalReAlloc
ReadFileEx
GetCommandLineA
GetStringTypeW
GetEnvironmentStringsW
SetLastError
TlsSetValue
UnlockFile
GetStringTypeA
EnumResourceTypesW
CreateMutexA
SetConsoleScreenBufferSize
RemoveDirectoryW
GetProcAddress
user32
RegisterClassExA
RegisterClassA
DdeConnect
shell32
SHAppBarMessage
Sections
.text Size: 145KB - Virtual size: 144KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 311KB - Virtual size: 310KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ