Static task
static1
Behavioral task
behavioral1
Sample
85dfe385f9e788f9c36d219e49ccf608862b2c1476389cbcae9a14b0b62782a4.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
85dfe385f9e788f9c36d219e49ccf608862b2c1476389cbcae9a14b0b62782a4.exe
Resource
win10v2004-20230703-en
General
-
Target
85dfe385f9e788f9c36d219e49ccf608862b2c1476389cbcae9a14b0b62782a4
-
Size
96KB
-
MD5
d43ef9b10c155638413fbb0ce18c9237
-
SHA1
b5acbf82801952beb27f00ceca796da32affc20b
-
SHA256
85dfe385f9e788f9c36d219e49ccf608862b2c1476389cbcae9a14b0b62782a4
-
SHA512
ab995bcf4fb42d6fcbebd57ec968aa5f40e4e86a2c273173248c5ad71f9681ccfce0d98f5b3995f2ac87e95a449716a18c91945d078620adc8a15872cb4d0399
-
SSDEEP
1536:joUgAmLNXA/aBKhMQgQ3jXD2ig9fQazqAqUUig9XazqAqU6y99:joUgXqaUMlQ33wfKAezACy3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 85dfe385f9e788f9c36d219e49ccf608862b2c1476389cbcae9a14b0b62782a4
Files
-
85dfe385f9e788f9c36d219e49ccf608862b2c1476389cbcae9a14b0b62782a4.exe windows x86
1d0e23ac3c0c26d3e488a68595c8f6cb
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
PathFileExistsA
mfc42
ord2841
ord800
ord540
ord567
ord825
ord4243
ord535
ord3092
ord4694
ord5981
ord2864
ord5148
ord802
ord801
ord541
ord542
ord3301
ord2379
ord3293
ord3910
ord2107
ord3089
ord6907
ord858
ord665
ord1979
ord5442
ord3318
ord5186
ord354
ord2818
ord860
ord537
ord5265
ord4376
ord4853
ord4998
ord2514
ord6052
ord1775
ord4407
ord5280
ord4425
ord3597
ord3402
ord641
ord1146
ord1168
ord324
ord4234
ord4224
ord2642
ord668
ord3998
ord941
ord2770
ord356
ord6215
ord6199
ord4160
ord2863
ord4710
ord1085
ord5601
ord5710
ord6883
ord2764
ord6143
ord5572
ord2915
ord3499
ord2515
ord355
ord1816
ord2614
ord823
ord4229
ord2411
ord2023
ord4218
ord2578
ord4398
ord3582
ord616
ord4275
ord2860
ord3874
ord2080
ord3317
ord1086
ord3610
ord656
ord2763
ord2089
ord4673
ord4274
ord6375
ord4486
ord2554
ord2512
ord5731
ord3922
ord1089
ord5199
ord2396
ord3346
ord5300
ord5302
ord4079
ord4698
ord5307
ord5289
ord5714
ord4622
ord3738
ord561
ord815
ord2621
ord1134
ord2725
ord2370
ord4287
ord6197
ord6378
ord1576
ord470
ord4220
ord2584
ord3654
ord6270
ord2438
ord1644
ord6334
ord1842
ord4242
ord2723
ord2390
ord3059
ord5100
ord5103
ord4467
ord4303
ord3350
ord5012
ord975
ord5472
ord3403
ord2879
ord2878
ord4151
ord4077
ord5237
ord5282
ord2649
ord1665
ord4436
ord5252
ord4427
ord366
ord674
ord4457
ord4499
ord1175
ord1871
ord2092
ord5484
ord3663
ord4424
ord4627
ord4080
ord3079
ord3825
ord3831
ord3830
ord2976
ord3081
ord2985
ord3262
ord3136
ord4465
ord3259
ord3147
ord2982
ord5277
ord2124
ord2446
ord5261
ord1727
ord5065
ord3749
ord6376
ord2055
ord2648
ord4441
ord4837
ord3798
ord5290
ord4353
ord6374
ord5163
ord2385
ord5241
ord1776
ord4078
ord6055
ord755
msvcrt
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
_onexit
__dllonexit
_mbsnbcpy
strrchr
_local_unwind2
_except_handler3
_mbsicmp
fseek
ftell
atoi
sprintf
malloc
fopen
_setmbcp
fwrite
free
fclose
_vsnprintf
_mbscmp
__CxxFrameHandler
fread
kernel32
FreeLibrary
GetProcAddress
LoadLibraryA
GetPrivateProfileStringA
CreateFileA
TerminateProcess
OpenProcess
GetCurrentProcess
GetLastError
Process32Next
Process32First
CreateToolhelp32Snapshot
CreateMutexA
SetUnhandledExceptionFilter
ProcessIdToSessionId
GetModuleFileNameA
GetModuleHandleA
GetStartupInfoA
OutputDebugStringA
GetPrivateProfileIntA
GetFileAttributesA
GetSystemDirectoryA
CopyFileA
GetFileSize
CloseHandle
user32
GetCursorPos
SetForegroundWindow
IsIconic
GetSystemMetrics
PostQuitMessage
LoadAcceleratorsA
PostMessageA
TranslateMessage
DispatchMessageA
MessageBeep
DeleteMenu
GetSystemMenu
AppendMenuA
GetMessagePos
ScreenToClient
LoadIconA
EnableWindow
GetClientRect
PtInRect
GetKeyState
GetWindowLongA
SendMessageA
GetFocus
KillTimer
RegisterWindowMessageA
LoadMenuA
GetWindowRect
GetSubMenu
GetParent
DrawIcon
advapi32
SetTokenInformation
DuplicateTokenEx
CreateProcessAsUserA
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenProcessToken
shell32
Shell_NotifyIconA
tfsm_htintf
ord1
ord3
ord2
ord4
userenv
DestroyEnvironmentBlock
CreateEnvironmentBlock
wtsapi32
WTSQueryUserToken
WTSRegisterSessionNotification
WTSUnRegisterSessionNotification
Sections
.text Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 48KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ