Static task
static1
Behavioral task
behavioral1
Sample
cf80ffb4b594be728409751f1c2ee3ce5b981d132bcc055be398e67071afa78b.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
cf80ffb4b594be728409751f1c2ee3ce5b981d132bcc055be398e67071afa78b.exe
Resource
win10v2004-20230703-en
General
-
Target
cf80ffb4b594be728409751f1c2ee3ce5b981d132bcc055be398e67071afa78b
-
Size
44KB
-
MD5
bc5539379f6f115be484339d50380058
-
SHA1
21d87180b70aa87a7edac04e11d8f93e42894c7b
-
SHA256
cf80ffb4b594be728409751f1c2ee3ce5b981d132bcc055be398e67071afa78b
-
SHA512
5dd1c75272abd3ebb98f8c1ffdf6d7bdcb41894aaa08322f6f7a60468195c15303103ff5273cac6f63c9a3308567df5ed388468767c03b8de9a920644e85cbe7
-
SSDEEP
768:xUaCZ0RSTfHHY5Si1X8ayJLRRhHKCk0j9Japovp8etX:xoZ0ROfH45SO3YJJKoBJtX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource cf80ffb4b594be728409751f1c2ee3ce5b981d132bcc055be398e67071afa78b
Files
-
cf80ffb4b594be728409751f1c2ee3ce5b981d132bcc055be398e67071afa78b.exe windows x86
75ce83006d8da226301e524dccddd1ef
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
IsDBCSLeadByte
GetFullPathNameA
DeleteFileA
FreeLibrary
RemoveDirectoryA
FindNextFileA
LoadLibraryA
GetProcAddress
CreateDirectoryA
GetFileAttributesA
FindFirstFileA
FindClose
CopyFileA
SetCurrentDirectoryA
WinExec
GetVersion
MultiByteToWideChar
GetDriveTypeA
GetStringTypeA
RtlUnwind
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
LCMapStringW
LCMapStringA
WideCharToMultiByte
ExitProcess
GetCommandLineA
GetStartupInfoA
GetModuleHandleA
HeapFree
HeapAlloc
HeapReAlloc
GetStringTypeW
GetCPInfo
WriteFile
GetOEMCP
GetModuleFileNameA
GetACP
user32
GetWindowRect
ScreenToClient
CreateWindowExA
SetActiveWindow
CallWindowProcA
MoveWindow
PeekMessageA
EnableWindow
PostQuitMessage
GetWindowTextA
wsprintfA
GetSystemMetrics
LoadIconA
GetWindowWord
GetWindowLongA
SetWindowWord
SetWindowLongA
SystemParametersInfoA
AttachThreadInput
GetForegroundWindow
SetForegroundWindow
SetDlgItemTextA
SendDlgItemMessageA
SetClassLongA
SendMessageA
PostMessageA
BringWindowToTop
MessageBoxA
GetDlgItem
GetDlgItemTextA
SetTimer
KillTimer
ShowWindow
UpdateWindow
IsWindow
EndDialog
DestroyWindow
TranslateAcceleratorA
IsDialogMessageA
DialogBoxParamA
CreateDialogParamA
LoadCursorA
FindWindowA
RegisterClassA
DefWindowProcA
GetParent
GetMessageA
TranslateMessage
DispatchMessageA
GetClassNameA
EnumWindows
GetWindowThreadProcessId
SetWindowTextA
advapi32
GetUserNameA
RegOpenKeyExA
RegCreateKeyExA
RegCloseKey
RegQueryValueA
RegQueryValueExA
RegSetValueExA
RegDeleteKeyA
RegDeleteValueA
RegEnumKeyExA
RegEnumValueA
shell32
SHChangeNotify
SHGetMalloc
SHBrowseForFolderA
SHGetPathFromIDListA
ShellExecuteA
ole32
CoUninitialize
CoInitialize
CoCreateInstance
comctl32
ord17
Sections
.text Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ