Static task
static1
Behavioral task
behavioral1
Sample
a21847b09f7b41fe224e0b52b5104cc16a2d5e974e19a1d64dfc43864f9f6513.exe
Resource
win7-20240704-en
General
-
Target
a21847b09f7b41fe224e0b52b5104cc16a2d5e974e19a1d64dfc43864f9f6513.exe
-
Size
476KB
-
MD5
c05841764b3eec7d901fd8fcd550c286
-
SHA1
355259b8c362b12a9d9c4f11115ad20bf337179e
-
SHA256
a21847b09f7b41fe224e0b52b5104cc16a2d5e974e19a1d64dfc43864f9f6513
-
SHA512
fe7b338a5af42b1c873fbe8a1edf71e8c59e18b69809442ecefc8fbf1736852ff494e32e2c386d58c1ecb77925f80ed547f0491706fbc4d8906c7eb468165e81
-
SSDEEP
6144:WYOEZVt5SQ6Dtb69U66RGJ7z/7rM0N6PuOlMgsSfVjgBaFIKwgoSLBabVb:Ww6tb69UXYZ2Gis+gBYIvgfL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a21847b09f7b41fe224e0b52b5104cc16a2d5e974e19a1d64dfc43864f9f6513.exe
Files
-
a21847b09f7b41fe224e0b52b5104cc16a2d5e974e19a1d64dfc43864f9f6513.exe.exe windows:4 windows x86 arch:x86
94de6aa0083fec9493c954abf2c86b1c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
SendMessageA
EnumDisplayDevicesW
GetWindowThreadProcessId
ScrollWindowEx
DlgDirSelectComboBoxExW
CheckMenuItem
SetActiveWindow
MessageBoxW
DefWindowProcW
SetFocus
IsWindow
DrawAnimatedRects
RegisterClassA
IntersectRect
DrawTextExA
CreateWindowExA
DefWindowProcA
DdeGetData
ToUnicodeEx
RegisterClassExA
BeginPaint
InsertMenuItemA
UnhookWinEvent
SetForegroundWindow
SetScrollInfo
ShowWindow
CreateAcceleratorTableA
CreateMDIWindowA
GrayStringW
DestroyWindow
SetDeskWallpaper
SendMessageTimeoutW
LookupIconIdFromDirectory
DdeReconnect
OemToCharBuffA
DialogBoxParamA
SetWindowTextA
kernel32
GetProcAddress
HeapAlloc
GetVersionExA
ExitProcess
GetUserDefaultLCID
FlushFileBuffers
EnumSystemLocalesA
HeapReAlloc
GetProcessHeap
SetLastError
GetConsoleCP
lstrcatW
LeaveCriticalSection
SetUnhandledExceptionFilter
TlsGetValue
IsValidCodePage
GetCurrentProcessId
TlsSetValue
GetTickCount
GetACP
GetLogicalDriveStringsW
EnumResourceNamesW
GetConsoleOutputCP
ReadFile
UnmapViewOfFile
SetConsoleCtrlHandler
FreeLibrary
lstrlenA
GetTimeZoneInformation
GetModuleFileNameA
UnhandledExceptionFilter
GetOEMCP
GetFileType
VirtualAlloc
GetCurrentThreadId
OutputDebugStringW
SetEnvironmentVariableA
RtlUnwind
IsBadReadPtr
GetCommandLineA
GetLocaleInfoW
GetLastError
lstrcatA
SetStdHandle
OpenMutexA
GetTimeFormatA
WideCharToMultiByte
CompareStringW
CloseHandle
InterlockedIncrement
GetEnvironmentStringsW
InterlockedDecrement
TlsAlloc
HeapFree
IsValidLocale
WriteConsoleA
GetDateFormatA
IsDebuggerPresent
GetStdHandle
LoadLibraryA
HeapValidate
WaitForDebugEvent
HeapDestroy
CreateFileA
InitializeCriticalSection
GetCPInfo
MultiByteToWideChar
GetCurrentProcess
HeapCreate
RaiseException
GetCurrentThread
QueryPerformanceCounter
CreateMutexA
GetSystemTimeAsFileTime
WriteFile
TlsFree
GetStringTypeW
GetModuleFileNameW
GetConsoleMode
CreateFileMappingA
LoadLibraryW
FreeEnvironmentStringsA
OutputDebugStringA
LCMapStringW
DeleteCriticalSection
VirtualQuery
CompareStringA
WriteConsoleW
GetModuleHandleA
SetFilePointer
SetHandleCount
EnterCriticalSection
InterlockedExchange
GetEnvironmentStrings
FreeEnvironmentStringsW
DebugBreak
LocalUnlock
TerminateProcess
GetStartupInfoA
LCMapStringA
GetLocaleInfoA
VirtualFree
ResumeThread
GetStringTypeA
comctl32
ImageList_DragLeave
ImageList_Duplicate
InitCommonControlsEx
InitMUILanguage
Sections
.text Size: 212KB - Virtual size: 209KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 104KB - Virtual size: 101KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 92KB - Virtual size: 116KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
���u�uJ Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE