Static task
static1
Behavioral task
behavioral1
Sample
c12fd5b14dbafda395f41e9df5fc2269a361622cb6d0b714082b6526baac28dc.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
c12fd5b14dbafda395f41e9df5fc2269a361622cb6d0b714082b6526baac28dc.exe
Resource
win10v2004-20240508-en
General
-
Target
c12fd5b14dbafda395f41e9df5fc2269a361622cb6d0b714082b6526baac28dc
-
Size
121KB
-
MD5
69f0b43931b55023a0bb436b52d51117
-
SHA1
c1de5c4bfc4a7395cc55ef13d1b6abbe092848b3
-
SHA256
c12fd5b14dbafda395f41e9df5fc2269a361622cb6d0b714082b6526baac28dc
-
SHA512
6670a9f767d5d1681dfbcef70a2f959b121e0c8e08eeb4dd777c27c02be5d61ee08860f11c009bc3dae8e53c1e8fec0fe36bd66af8b77e03ccbe4d76a2a521fe
-
SSDEEP
1536:dYX7k0IGhtaVZue5TcoInx6rpK1dKPcbkS8fHVkcoM5Za/IO:dYX78bZQkrpKiP7S+VnoM+QO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c12fd5b14dbafda395f41e9df5fc2269a361622cb6d0b714082b6526baac28dc
Files
-
c12fd5b14dbafda395f41e9df5fc2269a361622cb6d0b714082b6526baac28dc.exe windows:4 windows x86 arch:x86
8eb61ffbaacb9c6b251dd1774271d7bd
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
InterlockedDecrement
SetEvent
InterlockedIncrement
ResetEvent
CreateEventA
GetTempFileNameA
GetFullPathNameA
FindFirstFileA
FindClose
GetTempPathA
FlushFileBuffers
SetStdHandle
SetFilePointer
IsBadCodePtr
IsBadReadPtr
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
GetFileAttributesA
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
SetUnhandledExceptionFilter
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
IsBadWritePtr
HeapReAlloc
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetVersionExA
GetEnvironmentVariableA
TlsGetValue
SetLastError
TlsAlloc
TlsSetValue
GetCurrentThreadId
HeapAlloc
GetOEMCP
GetACP
GetCPInfo
ExitProcess
GetVersion
GetCommandLineA
GetStartupInfoA
lstrcpynA
lstrcmpiA
GetLastError
WaitForSingleObject
Sleep
GlobalLock
GlobalUnlock
MultiByteToWideChar
lstrlenA
CreateProcessA
GetModuleFileNameA
RaiseException
HeapFree
lstrcpyA
lstrcatA
CloseHandle
GetModuleHandleA
GetProcAddress
WideCharToMultiByte
WriteFile
RtlUnwind
user32
wsprintfA
LoadStringA
DefWindowProcA
MessageBoxA
SetWindowLongA
GetWindowLongA
CreateWindowExA
GetClientRect
IsWindow
PostQuitMessage
SendMessageA
MoveWindow
SetWindowPos
SystemParametersInfoA
SetWindowTextA
DestroyWindow
RegisterClassA
FillRect
SetCursor
BeginPaint
EndPaint
RedrawWindow
ReleaseCapture
SetCapture
GetWindowRect
UnhookWindowsHookEx
SetWindowsHookExA
GetDC
ReleaseDC
LoadBitmapA
DdeFreeStringHandle
DdeUninitialize
DdeInitializeA
DdeCreateStringHandleA
IsClipboardFormatAvailable
GetCursorPos
TrackPopupMenu
DestroyIcon
DdeConnect
GetClipboardData
DdeClientTransaction
DdeDisconnect
FindWindowA
LoadCursorA
LoadIconA
LoadImageA
RegisterClassExA
SetTimer
SetClipboardViewer
KillTimer
ChangeClipboardChain
TranslateMessage
GetMessageA
DispatchMessageA
SetMenuItemInfoA
PostMessageA
SetForegroundWindow
IsIconic
ShowWindow
keybd_event
DestroyMenu
GetSystemMetrics
LoadMenuA
GetSubMenu
OpenClipboard
CloseClipboard
gdi32
SetBkColor
SetTextColor
MoveToEx
LineTo
CreateCompatibleDC
SelectObject
BitBlt
DeleteDC
DeleteObject
TextOutA
GetCharWidthA
CreateFontA
CreateSolidBrush
CreatePen
advapi32
GetUserNameA
RegOpenKeyExA
RegQueryValueExA
RegDeleteKeyA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
shell32
Shell_NotifyIconA
ole32
CoRevokeClassObject
CoRegisterClassObject
CoInitialize
CoUninitialize
CoGetMalloc
StringFromGUID2
CoTaskMemFree
Sections
.text Size: 60KB - Virtual size: 59KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.ropf Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ