Static task
static1
Behavioral task
behavioral1
Sample
19ec906a62b8911830cd92900c308bc443fafc3e5d4042cd2a2e0707114f187e.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
19ec906a62b8911830cd92900c308bc443fafc3e5d4042cd2a2e0707114f187e.exe
Resource
win10v2004-20240611-en
General
-
Target
19ec906a62b8911830cd92900c308bc443fafc3e5d4042cd2a2e0707114f187e
-
Size
37KB
-
MD5
3fcee7fb4e55cb33bc3ecaf826d77cec
-
SHA1
37d0386d3414401ff3709a0d187c4c3b5fdfe62b
-
SHA256
19ec906a62b8911830cd92900c308bc443fafc3e5d4042cd2a2e0707114f187e
-
SHA512
293bb7e03e263e686caca2b2e1649638af2785d5104610da7fa2d8185daea009a3d8c0b889d85b0fa7c9808e2c6c1d7dac6ca3d8f8f6c6badbef26ecf841a104
-
SSDEEP
768:T1rsWf2xCaipgxT+oQaWFCVcrvCcHG2ggqQt4ls5i47:Rna4pqsAiWWLgPQt4Q
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 19ec906a62b8911830cd92900c308bc443fafc3e5d4042cd2a2e0707114f187e
Files
-
19ec906a62b8911830cd92900c308bc443fafc3e5d4042cd2a2e0707114f187e.exe windows:5 windows x86 arch:x86
1383f7a4097ecdad5f351627ecc9c9f5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalCompact
GetSystemTime
FormatMessageW
FormatMessageA
GetStringTypeA
GetCPInfo
SetConsoleCtrlHandler
GlobalFree
FreeEnvironmentStringsW
GetCurrentProcessId
TerminateThread
GetModuleFileNameA
DeleteFileA
IsDebuggerPresent
FlushFileBuffers
HeapReAlloc
HeapAlloc
SetFilePointer
TlsAlloc
QueryPerformanceCounter
FindFirstFileA
GetOEMCP
SetEvent
IsValidLocale
GetProcessHeap
CreateFileA
FindClose
SetEnvironmentVariableA
GetUserDefaultUILanguage
MultiByteToWideChar
SearchPathA
SetUnhandledExceptionFilter
QueryPerformanceFrequency
GetConsoleCP
QueueUserAPC
GetOverlappedResult
GetStringTypeW
ReadFile
GetTimeZoneInformation
SleepEx
GetLocaleInfoA
CompareStringW
WideCharToMultiByte
TlsFree
ResumeThread
UpdateResourceW
LoadLibraryA
lstrcmpW
LoadLibraryW
WriteProcessMemory
OutputDebugStringW
CreateProcessA
GetConsoleMode
ExitProcess
GetCurrentProcess
TerminateProcess
UnhandledExceptionFilter
LoadLibraryExA
VirtualProtect
lstrlenW
GetModuleHandleA
FindResourceA
LoadLibraryExW
GetProcAddress
CreateFileW
OpenEventW
lstrcatW
LockResource
LocalFree
GlobalSize
GlobalAlloc
GetSystemTimeAsFileTime
MoveFileExA
RtlUnwind
user32
CharLowerW
GetDC
GetMessageW
KillTimer
DefWindowProcW
SetWindowPos
GetSysColorBrush
DefWindowProcA
SendDlgItemMessageA
GetSysColor
DrawFocusRect
CheckDlgButton
MapWindowPoints
InsertMenuItemA
AppendMenuA
GetFocus
GetDlgItemTextW
SetMenuItemBitmaps
CheckMenuItem
GetWindowTextA
GetCursorPos
SetProcessDefaultLayout
LoadImageW
EnableMenuItem
GetWindowPlacement
InvalidateRgn
RegisterWindowMessageA
CharNextW
DrawTextW
DrawTextA
GetMenuState
EnableWindow
ReleaseCapture
GetClipboardData
MessageBoxW
SetTimer
gdi32
CreateFontIndirectW
CreateDCW
SetAbortProc
GetTextExtentPointA
EndDoc
SetWindowExtEx
winspool.drv
GetPrinterA
advapi32
RegCloseKey
DeleteService
RegOpenKeyExA
OpenProcessToken
StartServiceA
IsTextUnicode
QueryServiceStatus
CloseServiceHandle
OpenSCManagerA
Sections
.text Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 944B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 25KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ