Static task
static1
Behavioral task
behavioral1
Sample
14e68d8021aac89a7959336a034641a1fb8642ef1d7c9911b55e58a6e4e835b5.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
14e68d8021aac89a7959336a034641a1fb8642ef1d7c9911b55e58a6e4e835b5.exe
Resource
win10v2004-20240802-en
General
-
Target
14e68d8021aac89a7959336a034641a1fb8642ef1d7c9911b55e58a6e4e835b5.exe
-
Size
198KB
-
MD5
ce7057701d1274f0f654bbdddae27151
-
SHA1
a371cc88834848b79ada4c0b81ba02b48d9ef6a9
-
SHA256
14e68d8021aac89a7959336a034641a1fb8642ef1d7c9911b55e58a6e4e835b5
-
SHA512
9bb9e1de7820f05bf620da9af77e12892f003c7fb173a7094c46f8740250d6f880ef25ac630571b0c176dec4f9838d970679587e657ce6c376837dd4cf9e7386
-
SSDEEP
6144:LzJfJxeSPnjBsn6tOSk18lpyAnEOzuGATUVfgaPW3y+e:LzJfqSf7sSw8jVnEOzzVfga+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 14e68d8021aac89a7959336a034641a1fb8642ef1d7c9911b55e58a6e4e835b5.exe
Files
-
14e68d8021aac89a7959336a034641a1fb8642ef1d7c9911b55e58a6e4e835b5.exe.exe windows:4 windows x86 arch:x86
3b185e7145ddd9436cbf2445ad717a5e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
CloseServiceHandle
ControlService
GetUserNameA
InitializeSecurityDescriptor
LockServiceDatabase
OpenProcessToken
RegDeleteValueA
RegQueryValueExA
kernel32
AddAtomA
CloseHandle
CreateDirectoryA
CreateEventA
CreateFileA
CreateFileMappingA
CreateMutexA
CreateThread
DeleteCriticalSection
DisableThreadLibraryCalls
ExitProcess
ExitThread
FileTimeToLocalFileTime
FindResourceA
FlushFileBuffers
GetConsoleMode
GetCurrentDirectoryA
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetFileSize
GetLastError
GetLocalTime
GetModuleHandleA
GetPrivateProfileSectionA
GetPrivateProfileStringA
GetProcAddress
GetProcessHeap
GetSystemInfo
GetSystemTime
GetSystemTimeAsFileTime
GetTempFileNameA
GetTickCount
GetVersion
GetVersionExA
GetWindowsDirectoryA
GlobalAlloc
GlobalReAlloc
GlobalUnlock
HeapAlloc
HeapReAlloc
InitializeCriticalSection
InterlockedCompareExchange
InterlockedDecrement
InterlockedExchange
InterlockedIncrement
IsBadWritePtr
IsValidCodePage
IsValidLocale
LCMapStringA
LeaveCriticalSection
LocalAlloc
LocalFree
LockResource
MapViewOfFile
Module32First
MoveFileA
MultiByteToWideChar
ReadFile
RtlUnwind
SetEndOfFile
SetEvent
SetFileAttributesA
SetFilePointer
SetPriorityClass
SystemTimeToFileTime
TlsFree
TlsSetValue
UnhandledExceptionFilter
VirtualProtect
VirtualQuery
WaitForSingleObject
WriteConsoleA
WriteFile
lstrcatA
lstrcmpA
lstrcmpiA
lstrcpynA
ole32
CoCreateFreeThreadedMarshaler
CoCreateInstance
StringFromGUID2
user32
CharPrevA
CharUpperA
ClientToScreen
DefWindowProcA
DispatchMessageA
EnableMenuItem
EnableWindow
EqualRect
FindWindowA
GetClassNameA
GetDlgItemTextA
GetFocus
GetForegroundWindow
GetMessageA
GetSysColor
GetSysColorBrush
GetWindowTextA
GetWindowThreadProcessId
IsRectEmpty
IsWindowEnabled
LoadCursorA
LoadStringA
MessageBoxA
SendMessageA
SetDlgItemTextA
SetForegroundWindow
TrackPopupMenu
UnregisterClassA
WinHelpA
wsprintfA
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
Sections
.text Size: 38KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 312KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 154KB - Virtual size: 156KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ