Static task
static1
Behavioral task
behavioral1
Sample
47b29e33d9a197ce2750d7315dec8e4cc90a4194480147ef9628604dcce67c57.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
47b29e33d9a197ce2750d7315dec8e4cc90a4194480147ef9628604dcce67c57.exe
Resource
win10v2004-20230220-en
General
-
Target
47b29e33d9a197ce2750d7315dec8e4cc90a4194480147ef9628604dcce67c57
-
Size
140KB
-
MD5
2c7faff27f38f698cd0d502e650668e4
-
SHA1
b865943df2f3f9a7782d4cef49ed2844310c4f8b
-
SHA256
47b29e33d9a197ce2750d7315dec8e4cc90a4194480147ef9628604dcce67c57
-
SHA512
08cb5c0110d64ed8931e0860a45b19ab1ba1e1f1d7270c08e8aabb78de0d67aff8d1575c78aaf3dd6af9f9bdeb3125af2162bbc396d2beaace9cfdb1fe72de07
-
SSDEEP
1536:Gf6Y1bnSFWBW+DJV2CCCGh1Zy+lIxyJJUpJSb9otcISgcqaeA:Gf9RnSFKTJvClhyRxczo+I/1aeA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 47b29e33d9a197ce2750d7315dec8e4cc90a4194480147ef9628604dcce67c57
Files
-
47b29e33d9a197ce2750d7315dec8e4cc90a4194480147ef9628604dcce67c57.exe windows x86
e8c19ba81525a652d050850b4e12cf81
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42u
ord2377
ord5157
ord6370
ord4347
ord5276
ord3793
ord4831
ord4435
ord2640
ord2047
ord6372
ord3744
ord5059
ord1720
ord5257
ord2438
ord2116
ord5273
ord4621
ord4419
ord3592
ord324
ord4229
ord2567
ord6051
ord1768
ord4390
ord5286
ord3397
ord3569
ord5237
ord1143
ord1165
ord540
ord567
ord2282
ord2352
ord2281
ord2362
ord2294
ord6211
ord3087
ord6330
ord2810
ord6195
ord860
ord823
ord4155
ord2858
ord2371
ord755
ord470
ord2644
ord5568
ord2634
ord1662
ord2910
ord1197
ord4401
ord1767
ord4073
ord6048
ord4704
ord4992
ord4847
ord4370
ord5261
ord1131
ord2613
ord2506
ord1569
ord800
ord609
ord641
ord815
ord825
ord561
ord3733
ord4418
ord4616
ord4075
ord3074
ord3820
ord3826
ord3825
ord2971
ord3076
ord2980
ord3257
ord3131
ord4459
ord3254
ord3142
ord2977
ord5710
ord5285
ord5303
ord4692
ord4074
ord2717
ord5298
ord5296
ord3341
ord2388
ord5193
ord1089
ord3917
ord5727
ord2504
ord2546
ord4480
ord6371
ord4269
ord861
ord4667
msvcrt
_controlfp
?terminate@@YAXXZ
??1type_info@@UAE@XZ
_onexit
__dllonexit
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__wgetmainargs
_wcmdln
exit
_XcptFilter
_exit
calloc
_purecall
_beginthreadex
swprintf
__CxxFrameHandler
wcscmp
free
_wtoi
memmove
??0exception@@QAE@ABV0@@Z
strncpy
??0exception@@QAE@XZ
_CxxThrowException
??1exception@@UAE@XZ
kernel32
GetSystemInfo
GetProcAddress
GetModuleHandleW
GetVersionExW
FreeLibrary
LoadLibraryW
CloseHandle
GetCurrentThread
GetCurrentProcess
CreateEventW
OpenEventW
SetEvent
WaitForSingleObject
CreateMutexW
OpenMutexW
LocalFree
MapViewOfFile
CreateFileMappingW
OpenFileMappingW
UnmapViewOfFile
WideCharToMultiByte
TerminateThread
lstrlenW
GetStartupInfoW
GetLastError
GetTickCount
GetCurrentProcessId
WaitForMultipleObjects
Sleep
ReleaseMutex
user32
DrawIcon
GetSystemMenu
GetSystemMetrics
SendMessageW
LoadIconW
IsIconic
EnableWindow
wsprintfW
AppendMenuW
GetClientRect
advapi32
SetSecurityDescriptorDacl
GetSecurityDescriptorSacl
SetSecurityDescriptorSacl
OpenThreadToken
OpenProcessToken
GetTokenInformation
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
InitializeSecurityDescriptor
winscard
SCardEndTransaction
SCardTransmit
SCardBeginTransaction
SCardListReadersW
SCardReconnect
g_rgSCardT1Pci
SCardDisconnect
SCardStatusW
SCardReleaseContext
SCardReleaseStartedEvent
SCardAccessStartedEvent
SCardEstablishContext
SCardConnectW
g_rgSCardT0Pci
wtsapi32
WTSFreeMemory
WTSQuerySessionInformationW
WTSEnumerateSessionsW
setupapi
SetupDiDestroyDeviceInfoList
SetupDiEnumDeviceInterfaces
SetupDiGetClassDevsW
SetupDiGetDeviceInterfaceDetailW
Sections
.text Size: 80KB - Virtual size: 79KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ