Static task
static1
Behavioral task
behavioral1
Sample
45887fe9e985daa86a8151979bfcfec91e78c2bfb0a05b3b9ce43b6615dc4cbb.exe
Resource
win7-20230712-en
General
-
Target
45887fe9e985daa86a8151979bfcfec91e78c2bfb0a05b3b9ce43b6615dc4cbb
-
Size
1.6MB
-
MD5
5a95525854812d617ebd657e1f3a306c
-
SHA1
a5f5a499106ab355217d6035aa9f4294dfa677ee
-
SHA256
45887fe9e985daa86a8151979bfcfec91e78c2bfb0a05b3b9ce43b6615dc4cbb
-
SHA512
4ad47199a4072be0ec18e133ff621df5a0e304cff7d6649d52cb47c6614b163201a8ca3b0ca5466b3925a13871bb546ab2f08c9579d27de058778f020fe8d0dc
-
SSDEEP
24576:/iShs/+bh75hSaByQ4D1Tt2q+S5YexOjgIJn8/9Jd6VufkrIlzuChEopc:lsWJ58ll4sYeAjwlkMzEoS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 45887fe9e985daa86a8151979bfcfec91e78c2bfb0a05b3b9ce43b6615dc4cbb
Files
-
45887fe9e985daa86a8151979bfcfec91e78c2bfb0a05b3b9ce43b6615dc4cbb.exe windows x86
2cab5e74b29bfe55d0d132a67bcfb385
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42
ord6055
ord4078
ord1776
ord4407
ord2385
ord5163
ord4353
ord3798
ord4837
ord4441
ord2648
ord2055
ord6376
ord3749
ord1727
ord2124
ord5277
ord2982
ord3147
ord3259
ord4465
ord3136
ord3262
ord2985
ord3081
ord2976
ord3830
ord3831
ord3825
ord3079
ord4080
ord4627
ord4424
ord807
ord2920
ord2012
ord2120
ord554
ord4163
ord1644
ord1146
ord939
ord940
ord941
ord5787
ord4133
ord4297
ord1621
ord537
ord2764
ord4202
ord5856
ord536
ord2452
ord2753
ord1195
ord472
ord5572
ord2919
ord5450
ord6394
ord5440
ord6383
ord2575
ord4396
ord5241
ord6374
ord5290
ord5065
ord5261
ord2446
ord3402
ord3574
ord809
ord609
ord556
ord567
ord4275
ord4284
ord2379
ord5053
ord4774
ord5981
ord6270
ord3874
ord283
ord613
ord6880
ord289
ord2122
ord4160
ord6907
ord5678
ord6199
ord2582
ord4402
ord3370
ord3640
ord5265
ord4376
ord4853
ord4998
ord2514
ord6052
ord1775
ord5280
ord4425
ord6741
ord3610
ord2587
ord4406
ord3394
ord3729
ord6508
ord656
ord693
ord804
ord641
ord324
ord2302
ord4234
ord4710
ord3302
ord3797
ord3996
ord6215
ord6785
ord2642
ord4224
ord3873
ord2411
ord2023
ord4218
ord2578
ord4398
ord3582
ord616
ord795
ord692
ord2818
ord2820
ord3811
ord4673
ord4274
ord6375
ord4486
ord2554
ord2512
ord5731
ord3922
ord1089
ord5199
ord2396
ord3346
ord5300
ord5302
ord2725
ord4079
ord4698
ord5307
ord5289
ord5714
ord4622
ord3738
ord561
ord815
ord2621
ord1134
ord1168
ord755
ord470
ord3719
ord793
ord2294
ord2362
ord6334
ord2645
ord1771
ord6366
ord2413
ord2024
ord4219
ord2581
ord4401
ord3639
ord3721
ord2086
ord5655
ord6625
ord4299
ord955
ord6662
ord2754
ord6128
ord5148
ord5768
ord3752
ord4694
ord4476
ord5794
ord5789
ord5873
ord6172
ord6021
ord6189
ord4330
ord6186
ord5756
ord6192
ord5759
ord2971
ord3619
ord1641
ord858
ord2614
ord5788
ord2567
ord2414
ord5683
ord4277
ord2763
ord4129
ord5875
ord3626
ord3693
ord3573
ord3571
ord2859
ord1175
ord5860
ord2408
ord2096
ord2864
ord2405
ord323
ord1640
ord5785
ord6194
ord640
ord3596
ord5864
ord6061
ord5571
ord5579
ord3597
ord5736
ord5606
ord2863
ord4083
ord6142
ord823
ord2438
ord3663
ord3654
ord2584
ord4220
ord1862
ord825
ord500
ord3701
ord772
ord540
ord1574
ord860
ord535
ord800
ord1099
ord686
ord3998
ord384
msvcrt
_CxxThrowException
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
__CxxFrameHandler
malloc
memset
free
wcscpy
wcslen
_ftol
memcpy
_mbscmp
strlen
memmove
_mbsnbcpy
sprintf
strcpy
exit
_mbschr
_acmdln
_XcptFilter
__dllonexit
_onexit
??1type_info@@UAE@XZ
_exit
_controlfp
kernel32
GetModuleHandleA
GetProfileStringA
GlobalFree
GlobalLock
GlobalAlloc
lstrcpynA
Sleep
WinExec
CreateFileA
WriteFile
CloseHandle
MulDiv
InterlockedDecrement
GetPrivateProfileStringA
lstrcmpiA
FindResourceA
LoadResource
LockResource
GetCPInfo
lstrlenW
lstrlenA
GetVersion
GetVersionExA
GetLastError
MultiByteToWideChar
WideCharToMultiByte
LocalFree
GetStartupInfoA
user32
GetMenuItemID
GetMenuState
ModifyMenuA
GetMenuItemCount
AppendMenuA
GetSystemMetrics
GetDesktopWindow
GetDC
GetSysColorBrush
ReleaseDC
DrawIconEx
DestroyIcon
SystemParametersInfoA
GetSysColor
CopyRect
FillRect
DrawEdge
SetRect
GetMenuItemInfoA
LoadBitmapA
CreatePopupMenu
UpdateWindow
GetDlgCtrlID
SetWindowPos
SetWindowLongA
SetClassLongA
GetCursorPos
IsWindow
PtInRect
CallWindowProcA
IsIconic
DrawIcon
GetSystemMenu
LoadIconA
MessageBoxA
LoadImageA
GetIconInfo
CreateIconIndirect
DrawStateA
GetClientRect
FrameRect
InflateRect
CreateMenu
OffsetRect
DrawFocusRect
GetWindowRect
PostMessageA
ClientToScreen
WindowFromPoint
GetActiveWindow
InvalidateRect
SetCursor
GetParent
GetNextDlgTabItem
IsMenu
SendMessageA
GetWindowLongA
DestroyCursor
EnableWindow
GetMenuStringA
GrayStringA
TabbedTextOutA
GetSubMenu
DrawTextA
gdi32
CreateDIBSection
SetPixel
GetPixel
GetObjectA
PatBlt
PtVisible
RectVisible
TextOutA
ExtTextOutA
Rectangle
Escape
SelectObject
SetBkColor
CreateBitmap
AbortDoc
EndDoc
EndPage
StartPage
StartDocA
CreateFontA
CreatePatternBrush
SetWindowOrgEx
CreateDCA
DeleteObject
DeleteDC
Ellipse
GetTextExtentPoint32A
GetTextExtentPoint32W
BitBlt
CreateCompatibleDC
CreateCompatibleBitmap
CreateFontIndirectA
CreateSolidBrush
CreatePen
GetStockObject
GetDeviceCaps
GetBkMode
winspool.drv
DocumentPropertiesA
advapi32
RegCloseKey
RegOpenKeyExA
RegOpenKeyA
RegQueryValueExA
shell32
ShellExecuteExA
comctl32
ImageList_Draw
ImageList_AddMasked
ImageList_ReplaceIcon
ImageList_GetImageCount
ImageList_GetIcon
_TrackMouseEvent
ole32
OleRun
CoCreateInstance
CoInitialize
oleaut32
GetErrorInfo
VariantClear
VariantCopy
VariantInit
SysFreeString
SysAllocString
VariantChangeType
SysAllocStringByteLen
SysStringByteLen
Sections
.text Size: 116KB - Virtual size: 113KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1.4MB - Virtual size: 1.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ