Static task
static1
Behavioral task
behavioral1
Sample
1321c4b2fd539912b545c74032013d926bc97e5f1b29c1030251ed96a1734dddN.exe
Resource
win7-20240903-en
General
-
Target
1321c4b2fd539912b545c74032013d926bc97e5f1b29c1030251ed96a1734dddN
-
Size
70KB
-
MD5
2b192a2df4b5e2285e9c7097d5075610
-
SHA1
251efc016914a6d085ad26f84af97d04025c041d
-
SHA256
1321c4b2fd539912b545c74032013d926bc97e5f1b29c1030251ed96a1734ddd
-
SHA512
c6023626d5ced6e27c8e4eff7ef8ce944f48467b8801fb5254e0e672405f77c21721b354e1ef56a4c14e4de56981a12cf0f0c10d101273e68c9ff0f26cfa1e5c
-
SSDEEP
1536:I2+/RwlGs0e6P7nK671OE/rKkcfaZFsCCwMeGenlzxEEaqJo1s:ID6wBe6DK67Q2rKkcfOtCNeGelzx/2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1321c4b2fd539912b545c74032013d926bc97e5f1b29c1030251ed96a1734dddN
Files
-
1321c4b2fd539912b545c74032013d926bc97e5f1b29c1030251ed96a1734dddN.exe windows:5 windows x86 arch:x86
3c3b53500a1cbc0f6f3a4b0f325de403
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegSetValueExA
RegCreateKeyA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
GetSidSubAuthority
GetSidSubAuthorityCount
GetSidIdentifierAuthority
IsValidSid
GetTokenInformation
OpenProcessToken
RegDeleteValueA
RegEnumValueA
RegEnumKeyExA
RegSetKeySecurity
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegDeleteKeyA
RegCreateKeyExA
RegQueryInfoKeyA
RegFlushKey
kernel32
lstrlenA
SetLastError
CloseHandle
GetLastError
GetCurrentProcess
GetVersionExA
lstrcatA
lstrcpyA
lstrcmpiA
lstrcpynA
lstrcmpA
GlobalFree
GlobalUnlock
GlobalHandle
GlobalLock
GlobalAlloc
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
ExitProcess
GetProcAddress
WriteFile
GetStdHandle
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapDestroy
HeapCreate
VirtualFree
HeapFree
LCMapStringA
MultiByteToWideChar
LCMapStringW
LoadLibraryA
GetACP
GetOEMCP
GetCPInfo
HeapAlloc
VirtualAlloc
HeapReAlloc
GetStringTypeA
GetStringTypeW
VirtualProtect
GetSystemInfo
VirtualQuery
GetLocaleInfoA
RtlUnwind
ReadFile
SetFilePointer
SetStdHandle
FlushFileBuffers
user32
wsprintfA
PostMessageA
EnumChildWindows
EnumWindows
FindWindowA
SystemParametersInfoA
LoadKeyboardLayoutA
UnloadKeyboardLayout
ole32
CoCreateInstance
CoInitialize
CoUninitialize
Sections
.text Size: 38KB - Virtual size: 37KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 29KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ywhgjne Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE