Static task
static1
Behavioral task
behavioral1
Sample
13d8d4f4fa483111e4372a6925d24e28f3be082a2ea8f44304384982bd692ec9.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
13d8d4f4fa483111e4372a6925d24e28f3be082a2ea8f44304384982bd692ec9.exe
Resource
win10v2004-20240226-en
General
-
Target
13d8d4f4fa483111e4372a6925d24e28f3be082a2ea8f44304384982bd692ec9
-
Size
332KB
-
MD5
0c29a039f29d37bcfed222ca753ba41d
-
SHA1
7dc4632f2b781896185b267e4c1d6bd0a0195a2d
-
SHA256
13d8d4f4fa483111e4372a6925d24e28f3be082a2ea8f44304384982bd692ec9
-
SHA512
f7660575f70918c0730464be2b0e3b2faa93885d21e5f375b63451a5d39bbb52bc60ca950e45dfc731922328fda22551f6da6944a5ac520e49b5b7c7c9d56ee2
-
SSDEEP
6144:o0FiNSNZlT9ebr3l3UZrSXiJFh7KUXMFLfJdptVnwGoAf/Jtbe6ZVmm/:o0Fi0NZSbzl3VEhAdptVwEbZ7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 13d8d4f4fa483111e4372a6925d24e28f3be082a2ea8f44304384982bd692ec9
Files
-
13d8d4f4fa483111e4372a6925d24e28f3be082a2ea8f44304384982bd692ec9.exe windows:4 windows x86 arch:x86
559e88246a166c4a117d3e6feeba3644
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCloseKey
RegQueryValueExA
RegOpenKeyA
GetUserNameA
EqualSid
CopySid
GetLengthSid
SetSecurityDescriptorDacl
SetSecurityDescriptorOwner
InitializeSecurityDescriptor
AllocateAndInitializeSid
RegCreateKeyA
RegSetValueExA
user32
MsgWaitForMultipleObjects
PeekMessageA
SendMessageA
FindWindowA
GetForegroundWindow
GetCapture
GetClipboardOwner
GetQueueStatus
GetCursorPos
kernel32
SetEndOfFile
SetEnvironmentVariableA
CompareStringW
CompareStringA
HeapSize
InterlockedExchange
RtlUnwind
GetLocaleInfoA
SetFilePointer
GetCPInfo
GetOEMCP
GetTickCount
ReadFile
SetConsoleMode
GetConsoleMode
GetStdHandle
WriteFile
FreeLibrary
LoadLibraryA
GetProcAddress
CloseHandle
SetEvent
GetOverlappedResult
WaitForSingleObject
GetLastError
CreateEventA
CreateThread
GetVersionExA
GetSystemDirectoryA
FormatMessageA
GetSystemTimeAdjustment
GetSystemTime
GetProcessTimes
GetCurrentProcess
GetThreadTimes
GetCurrentThread
GlobalMemoryStatus
QueryPerformanceCounter
GetCurrentProcessId
FindClose
FindNextFileA
FindFirstFileA
GetWindowsDirectoryA
LocalFree
WaitNamedPipeA
CreateFileA
CreateNamedPipeA
ConnectNamedPipe
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
LocalAlloc
GetCurrentThreadId
GetFileType
CreateProcessA
SetHandleInformation
CreatePipe
OpenProcess
ClearCommBreak
SetCommTimeouts
SetCommState
GetCommState
SetCommBreak
ReleaseMutex
CreateMutexA
DeleteFileA
GetEnvironmentVariableA
GetLocalTime
GetModuleFileNameA
GetTimeFormatA
GetDateFormatA
HeapAlloc
HeapReAlloc
HeapFree
ExitProcess
GetModuleHandleA
TerminateProcess
GetSystemTimeAsFileTime
GetCommandLineA
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
FlushFileBuffers
WideCharToMultiByte
GetTimeZoneInformation
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
LCMapStringA
LCMapStringW
SetHandleCount
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetStdHandle
GetACP
Sections
.text Size: 236KB - Virtual size: 235KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 76KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ