Static task
static1
Behavioral task
behavioral1
Sample
ac9f08e36716cbb3777778d9144620618a2ee26bea0512da55f76c5290bd4617.exe
Resource
win7-20240729-en
General
-
Target
ac9f08e36716cbb3777778d9144620618a2ee26bea0512da55f76c5290bd4617.exe
-
Size
510KB
-
MD5
35f2c2d7baf199692f757c075ac0bc44
-
SHA1
c181c8f2fd20d847a70e10d72e25fac3983413c3
-
SHA256
ac9f08e36716cbb3777778d9144620618a2ee26bea0512da55f76c5290bd4617
-
SHA512
e0738e5c94b0d544228c265444186923caa0790aef79f49a644a02fa3cda00770a07de8be8fc6acee9d2d540d348e636794749348deab20842453e1f2d29ae13
-
SSDEEP
12288:UAJfG7BG7Ihl4RoyJqTf3gZRh0wYAjA77AOgm/CQlzsOaIWaPa2888888888888x:Un07IY6yJqb3gzhO8Y7Mm/CQJsOahr3m
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ac9f08e36716cbb3777778d9144620618a2ee26bea0512da55f76c5290bd4617.exe
Files
-
ac9f08e36716cbb3777778d9144620618a2ee26bea0512da55f76c5290bd4617.exe.exe windows:4 windows x86 arch:x86
30ae2619be90d01851e324ebee90e167
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualAlloc
LoadLibraryA
GetProcAddress
GetModuleHandleA
MultiByteToWideChar
lstrlenA
LocalFree
WriteConsoleW
GetStdHandle
FormatMessageW
GetLastError
CloseHandle
WaitForMultipleObjects
CreateThread
lstrcmpW
lstrcatW
lstrlenW
lstrcmpiW
GetConsoleOutputCP
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
user32
ReleaseCapture
LoadCursorW
LoadIconA
ReleaseDC
GetClassNameA
DdeInitializeW
EnumChildWindows
MenuItemFromPoint
PostMessageA
GetAltTabInfoA
GetPropA
IsCharAlphaNumericW
PeekMessageA
GetFocus
EmptyClipboard
SwitchToThisWindow
RegisterWindowMessageW
SendMessageCallbackW
SetWindowsHookA
SetMenuItemBitmaps
DdeCreateStringHandleA
GetKeyboardLayoutNameW
GetMenuStringA
UnregisterDeviceNotification
SetWindowTextA
IsHungAppWindow
SetScrollPos
IsDialogMessage
DialogBoxParamA
DrawCaption
RealGetWindowClassW
EndMenu
wvsprintfW
DdeClientTransaction
EnumClipboardFormats
DdeKeepStringHandle
SetThreadDesktop
PackDDElParam
VkKeyScanW
EndTask
GetMenuItemCount
DeregisterShellHookWindow
CreateIcon
gdi32
GetEnhMetaFileBits
GetStockObject
comdlg32
PrintDlgW
GetSaveFileNameA
GetSaveFileNameW
GetOpenFileNameW
advapi32
RegQueryValueExA
SetSecurityDescriptorDacl
ReportEventW
RegisterEventSourceW
RegUnLoadKeyW
RegSetValueExA
RegSetValueExW
RegQueryValueExW
RegQueryInfoKeyW
RegOpenKeyExA
RegOpenKeyExW
RegLoadKeyW
RegEnumKeyA
RegDeleteValueA
RegCreateKeyExA
RegCreateKeyExW
RegCloseKey
OpenProcessToken
LookupAccountSidA
LookupAccountSidW
InitializeSecurityDescriptor
GetUserNameA
GetTokenInformation
GetLengthSid
FreeSid
AllocateAndInitializeSid
GetUserNameW
GetKernelObjectSecurity
StartServiceA
StartServiceW
QueryServiceStatus
OpenServiceA
OpenServiceW
OpenSCManagerW
ControlService
CloseServiceHandle
CryptSetProvParam
CryptGetProvParam
CryptDestroyHash
CryptSignHashA
CryptSetHashParam
CryptCreateHash
CryptImportKey
CryptExportKey
CryptReleaseContext
CryptDestroyKey
CryptGetUserKey
CryptAcquireContextA
CryptDecrypt
shell32
ExtractIconEx
ExtractAssociatedIconExW
Shell_NotifyIcon
SHChangeNotify
ExtractIconA
ShellExecuteEx
WOWShellExecute
DoEnvironmentSubstW
SHGetFileInfo
ExtractIconExW
SHAddToRecentDocs
SHPathPrepareForWriteW
ShellExecuteExA
Shell_NotifyIconW
ole32
CoInitialize
CoCreateInstance
CoUninitialize
shlwapi
StrRStrIA
StrRChrW
Sections
.text Size: 282KB - Virtual size: 281KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 266B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data2 Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data3 Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 162KB - Virtual size: 161KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ