Static task
static1
Behavioral task
behavioral1
Sample
160215ae35c432b2cb1cbb15b75e51c4d704a36137b0d42e55506e8d13b92f15.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
160215ae35c432b2cb1cbb15b75e51c4d704a36137b0d42e55506e8d13b92f15.exe
Resource
win10v2004-20240508-en
General
-
Target
160215ae35c432b2cb1cbb15b75e51c4d704a36137b0d42e55506e8d13b92f15
-
Size
77KB
-
MD5
e709c5e538a6e46295b626879ee62864
-
SHA1
98ede52302e707127e83f88c4637c69dfeaee563
-
SHA256
160215ae35c432b2cb1cbb15b75e51c4d704a36137b0d42e55506e8d13b92f15
-
SHA512
a9a75b83dc16a7a8b84eb8839a56e744ee416d06373c0a3ed12d6108c4427cc386b0464a770478ca96995c88ab187408ac845296672c6c49382221df1ddf015b
-
SSDEEP
1536:ZjyWGqN1jqSJ4Nvqr9PxDtl99x6xwDGmv5NBau7n+aEVJnUD:Zjymrjqo4Nu9ZDtjHDGmFV7n+aEVJA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 160215ae35c432b2cb1cbb15b75e51c4d704a36137b0d42e55506e8d13b92f15
Files
-
160215ae35c432b2cb1cbb15b75e51c4d704a36137b0d42e55506e8d13b92f15.exe windows:5 windows x86 arch:x86
227e7723246677b9a37436cd5a616b4a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_abnormal_termination
_mbsnbicmp
_mbsnbcmp
wcsncmp
wcscmp
_mbscmp
_vsnwprintf
fwprintf
_iob
_snwprintf
setlocale
_mbsicmp
_mbslwr
iswctype
memmove
wcsrchr
wcschr
_mbscpy
_wcsnicmp
_mbsinc
_except_handler3
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_cexit
_XcptFilter
_exit
_c_exit
wcscpy
_wcsicmp
wcslen
advapi32
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
RegSetValueExW
RegEnumValueW
RegDeleteKeyW
GetUserNameW
RegDeleteValueW
kernel32
GetVersionExW
HeapFree
MoveFileExW
GetModuleFileNameW
SetLastError
GetLastError
lstrcmpW
DeleteFileA
SetThreadExecutionState
CloseHandle
CreateProcessW
GetWindowsDirectoryW
GetProcessHeap
GetModuleHandleA
GetStartupInfoA
OutputDebugStringW
CreateFileA
CreateMutexA
GetComputerNameW
SetFileAttributesA
SetFilePointer
GetCurrentThreadId
GetVersionExA
InitializeCriticalSection
DeleteCriticalSection
HeapReAlloc
HeapAlloc
ExitProcess
SetEvent
CreateEventA
FormatMessageW
FormatMessageA
LocalAlloc
LocalFree
GetWindowsDirectoryA
SetThreadLocale
GetThreadLocale
WideCharToMultiByte
MultiByteToWideChar
LeaveCriticalSection
EnterCriticalSection
WriteFile
ReleaseMutex
RaiseException
lstrcpyA
lstrlenA
WaitForMultipleObjects
InterlockedIncrement
InterlockedExchange
Sleep
gdi32
SelectObject
GetTextMetricsW
GetTextExtentPointW
DeleteDC
CreateDCW
user32
LoadCursorW
SetCursor
DialogBoxParamW
GetForegroundWindow
SetForegroundWindow
EndDialog
GetWindowTextW
SetWindowTextW
SetFocus
SetTimer
GetDlgItem
SendMessageW
GetWindowRect
MapDialogRect
PostMessageW
KillTimer
MessageBoxA
MessageBoxW
CharLowerW
setupapi
SetupCloseInfFile
SetupLogErrorW
SetupOpenLog
SetupCloseLog
netapi32
NetApiBufferFree
NetUserModalsGet
NetUserGetInfo
NetUserSetInfo
comctl32
InitCommonControlsEx
Sections
.text Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 56KB - Virtual size: 57KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE