Static task
static1
Behavioral task
behavioral1
Sample
d83287a7b7c62601b17f8ffff1bfb8927468c48a81af863625d0983b4b5f7d75.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
d83287a7b7c62601b17f8ffff1bfb8927468c48a81af863625d0983b4b5f7d75.exe
Resource
win10v2004-20230703-en
General
-
Target
d83287a7b7c62601b17f8ffff1bfb8927468c48a81af863625d0983b4b5f7d75
-
Size
206KB
-
MD5
89cbf2333a065c60648ba2aa618bffe2
-
SHA1
cab1047c1c6704f4c8f6ebae20acd1b7494ff208
-
SHA256
d83287a7b7c62601b17f8ffff1bfb8927468c48a81af863625d0983b4b5f7d75
-
SHA512
bff422663aeee63adb2d5df5e16d29565a27fc1c6f70705af4645b30334b346591930b5b6ee49464502360760ccb6dd0739fb72840c85cef5fb8341a0af9c90c
-
SSDEEP
6144:qstc11O3IwYfhx9rpEGskJJXHF5AC9jb6EV:qxfzFKG9DV5AC5x
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d83287a7b7c62601b17f8ffff1bfb8927468c48a81af863625d0983b4b5f7d75
Files
-
d83287a7b7c62601b17f8ffff1bfb8927468c48a81af863625d0983b4b5f7d75.exe windows x86
194f69bb1ac6a5c63140a249157f6762
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mfc100u
ord2853
ord8393
ord10045
ord6247
ord11163
ord8112
ord13380
ord10937
ord3402
ord11081
ord8277
ord14060
ord14059
ord14132
ord14149
ord14145
ord14147
ord14148
ord4434
ord2417
ord7385
ord2884
ord2887
ord12606
ord5556
ord2756
ord2980
ord2981
ord10412
ord10058
ord11123
ord5264
ord293
ord285
ord2629
ord1479
ord4413
ord4379
ord4383
ord4416
ord3999
ord14067
ord3992
ord2665
ord13382
ord7109
ord13388
ord6156
ord10725
ord12557
ord5276
ord2339
ord12724
ord3491
ord2952
ord4396
ord4421
ord11159
ord5143
ord9333
ord8347
ord5828
ord8179
ord12951
ord8599
ord10081
ord1212
ord788
ord13047
ord4805
ord9525
ord6711
ord1934
ord1905
ord381
ord1312
ord1313
ord290
ord265
ord1440
ord4478
ord2614
ord7624
ord7548
ord11784
ord13854
ord4744
ord2164
ord11476
ord11477
ord13381
ord7108
ord13387
ord8530
ord3684
ord3625
ord11864
ord7126
ord1739
ord14162
ord10976
ord13267
ord11469
ord11246
ord11244
ord1501
ord1508
ord1514
ord1512
ord1519
ord4388
ord11116
ord4425
ord7179
ord13570
ord13567
ord13572
ord13569
ord13571
ord4408
ord4404
ord4400
ord2951
ord4430
ord13568
ord3416
ord2852
ord4392
ord5261
ord11228
ord11236
ord4086
ord7391
ord9498
ord11240
ord11209
ord11845
ord4642
ord4923
ord5115
ord8483
ord4901
ord5118
ord4645
ord4794
ord4623
ord6931
ord6932
ord6922
ord4792
ord7393
ord9328
ord8346
ord6140
ord948
ord3627
ord12753
ord1895
ord7176
ord1292
ord890
ord6869
ord9447
ord1474
ord286
ord1310
ord4290
ord296
ord280
ord902
ord266
ord2089
ord1298
ord14146
ord1300
msvcr100
memset
_CxxThrowException
__CxxFrameHandler3
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_crt_debugger_hook
_controlfp_s
_invoke_watson
_except_handler4_common
_onexit
_lock
__dllonexit
_unlock
?terminate@@YAXXZ
__set_app_type
_fmode
_commode
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_wcmdln
exit
_XcptFilter
_exit
_cexit
__wgetmainargs
_amsg_exit
?what@exception@std@@UBEPBDXZ
fread
??1bad_cast@std@@UAE@XZ
??0bad_cast@std@@QAE@ABV01@@Z
??0bad_cast@std@@QAE@PBD@Z
fflush
setvbuf
fsetpos
fgetpos
_fseeki64
fwrite
_unlock_file
_lock_file
fclose
ungetc
fgetc
??0exception@std@@QAE@ABV01@@Z
free
memcpy_s
memmove
??1exception@std@@UAE@XZ
??0exception@std@@QAE@ABQBD@Z
memcpy
kernel32
GetStartupInfoW
EncodePointer
DecodePointer
SetUnhandledExceptionFilter
QueryPerformanceCounter
GetTickCount
HeapSetInformation
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
IsDebuggerPresent
InterlockedCompareExchange
Sleep
InterlockedExchange
CreateProcessW
GetSystemDefaultLangID
SetCurrentDirectoryW
GetCurrentThreadId
GetCurrentDirectoryW
CreateDirectoryW
user32
MessageBoxW
DrawIcon
GetClientRect
GetSystemMetrics
IsIconic
SendMessageW
LoadIconW
wsprintfW
EnableWindow
advapi32
RegQueryValueExW
RegCloseKey
RegSetValueExW
RegCreateKeyExA
RegOpenKeyExA
shell32
SHGetMalloc
SHGetPathFromIDListW
SHBrowseForFolderW
ShellExecuteW
comctl32
InitCommonControlsEx
msvcp100
?getloc@ios_base@std@@QBE?AVlocale@2@XZ
??1ios_base@std@@UAE@XZ
?_Xlength_error@std@@YAXPBD@Z
?uncaught_exception@std@@YA_NXZ
?_Unlock@_Mutex@std@@QAEXXZ
?_Lock@_Mutex@std@@QAEXXZ
??1_Mutex@std@@QAE@XZ
_Toupper
_Tolower
?_Getgloballocale@locale@std@@CAPAV_Locimp@12@XZ
??1_Lockit@std@@QAE@XZ
??0_Lockit@std@@QAE@H@Z
?clear@ios_base@std@@QAEXH_N@Z
??1ctype_base@std@@UAE@XZ
??0ctype_base@std@@QAE@I@Z
?do_encoding@codecvt_base@std@@MBEHXZ
?do_max_length@codecvt_base@std@@MBEHXZ
?do_always_noconv@codecvt_base@std@@MBE_NXZ
??1codecvt_base@std@@UAE@XZ
?always_noconv@codecvt_base@std@@QBE_NXZ
??0codecvt_base@std@@QAE@I@Z
?_Decref@facet@locale@std@@QAEPAV123@XZ
?_Incref@facet@locale@std@@QAEXXZ
??Bid@locale@std@@QAEIXZ
?_Getctype@_Locinfo@std@@QBE?AU_Ctypevec@@XZ
??1_Locinfo@std@@QAE@XZ
??0_Locinfo@std@@QAE@PBD@Z
?_Init@locale@std@@CAPAV_Locimp@12@XZ
?_Fiopen@std@@YAPAU_iobuf@@PB_WHH@Z
??0_Mutex@std@@QAE@XZ
?_Init@ios_base@std@@IAEXXZ
?_BADOFF@std@@3_JB
Sections
.text Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 146KB - Virtual size: 146KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ