Static task
static1
Behavioral task
behavioral1
Sample
HEUR-Trojan.Win32.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
HEUR-Trojan.Win32.exe
Resource
win10v2004-20230220-en
General
-
Target
HEUR-Trojan.Win32.Generic-cf0ddff94b84954900457f39b209c5aab6e5c46d723d5afdf310032a6e650cc3
-
Size
77KB
-
MD5
07076e5d4ddc70cb5419b3ca644a013a
-
SHA1
38ea99d93a01e38c55963ab4925e0db0e0af6615
-
SHA256
cf0ddff94b84954900457f39b209c5aab6e5c46d723d5afdf310032a6e650cc3
-
SHA512
37480302f9cb0594e600a8dcf1874ff010019abf7d74a92fde00fab64b6ad52572cd600e336268e678f4b20e36c9c632f44b14f79a30671b1eb721726a7f1822
-
SSDEEP
1536:EfU+/uv/P5DKW7TPf3jpYfVCFDU+dlXvLnvNPTafI9O:E5Y/P5D37jNsVCFI+TjnVWg
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource HEUR-Trojan.Win32.Generic-cf0ddff94b84954900457f39b209c5aab6e5c46d723d5afdf310032a6e650cc3
Files
-
HEUR-Trojan.Win32.Generic-cf0ddff94b84954900457f39b209c5aab6e5c46d723d5afdf310032a6e650cc3.exe windows x86
863a6d1983997d2e938762a65cde55a2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
memset
strncmp
strncpy
_strnicmp
strstr
strlen
strcpy
strcat
memcpy
kernel32
GetModuleHandleA
HeapCreate
VirtualProtect
VirtualAlloc
VirtualLock
HeapDestroy
ExitProcess
LoadLibraryA
CreateIoCompletionPort
HeapAlloc
HeapFree
GetCurrentThreadId
GetCurrentProcessId
CloseHandle
InitializeCriticalSection
GetEnvironmentVariableA
SetEnvironmentVariableA
GetCurrentProcess
DuplicateHandle
CreatePipe
GetStdHandle
CreateProcessA
WaitForSingleObject
EnterCriticalSection
LeaveCriticalSection
GetDriveTypeA
FindFirstFileA
FindClose
GetFileAttributesA
WriteFile
CreateFileA
SetFilePointer
HeapReAlloc
DeleteCriticalSection
GetProcAddress
FreeLibrary
Sleep
user32
MessageBoxA
EnumWindows
GetWindowTextA
GetMenuCheckMarkDimensions
CharLowerA
GetWindowThreadProcessId
IsWindowVisible
GetWindowLongA
GetForegroundWindow
IsWindowEnabled
EnableWindow
SetWindowPos
comctl32
InitCommonControlsEx
ole32
CoInitialize
shell32
ShellExecuteExA
imm32
ImmEnumRegisterWordA
Sections
.code Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 73B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ