Static task
static1
Behavioral task
behavioral1
Sample
d768ef513624aacbd9b89b065e7b6b32c5dc8d615440f3f3f19235e804e8d755.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
d768ef513624aacbd9b89b065e7b6b32c5dc8d615440f3f3f19235e804e8d755.exe
Resource
win10v2004-20230703-en
General
-
Target
d768ef513624aacbd9b89b065e7b6b32c5dc8d615440f3f3f19235e804e8d755
-
Size
200KB
-
MD5
10024acf184e26d4299d2128a9e4ceac
-
SHA1
d46bac901b061a0fd86257342ca3ae4da9638091
-
SHA256
d768ef513624aacbd9b89b065e7b6b32c5dc8d615440f3f3f19235e804e8d755
-
SHA512
35b6fc34a22ac953b2f95833f00915582a2d15dff542022493b0c4011aadfdb6504312c01736f5063be4986047a2ebaddb38b76840d3c1ccbb4d0a67fb339162
-
SSDEEP
3072:CoLcsy7YDtaDfpciYTcomylzNmKcH4H6FYfi9STWyB2pku0l4NgCp:6suYDtaddzylzNmKS7FYflWdpku5N
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d768ef513624aacbd9b89b065e7b6b32c5dc8d615440f3f3f19235e804e8d755
Files
-
d768ef513624aacbd9b89b065e7b6b32c5dc8d615440f3f3f19235e804e8d755.exe windows x86
9c82236ad14f5d892b7d3eb266c9a2a1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LocalAlloc
GetProcAddress
GetModuleHandleA
GetVersionExA
SetLastError
CreateDirectoryA
SetFileAttributesA
GetFileAttributesA
CopyFileA
RemoveDirectoryA
FindNextFileA
GetSystemDirectoryA
GetUserDefaultLangID
WinExec
Sleep
SetCurrentDirectoryA
GetCurrentProcess
GetCurrentThread
FormatMessageA
HeapFree
GetProcessHeap
HeapAlloc
OpenProcess
GetTickCount
CreateProcessA
FlushFileBuffers
HeapSize
SetStdHandle
lstrcmpA
InterlockedExchange
InitializeCriticalSection
VirtualQuery
GetSystemInfo
VirtualProtect
GetLocaleInfoA
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
HeapReAlloc
VirtualAlloc
IsBadCodePtr
IsBadWritePtr
IsBadReadPtr
VirtualFree
HeapCreate
HeapDestroy
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
FreeLibrary
LoadLibraryA
GetModuleFileNameA
GetPrivateProfileStringA
SetFilePointer
GetLastError
CreateMutexA
WaitForSingleObject
WriteFile
GetTempPathA
GetTempFileNameA
CreateFileA
GetFileSize
ReadFile
FindFirstFileA
FindClose
DeleteFileA
CloseHandle
LocalFree
lstrlenW
InterlockedIncrement
MultiByteToWideChar
WideCharToMultiByte
lstrlenA
InterlockedDecrement
UnhandledExceptionFilter
GetStdHandle
TerminateProcess
RtlUnwind
RaiseException
GetStartupInfoA
GetCommandLineA
TlsAlloc
GetCurrentThreadId
TlsFree
TlsSetValue
TlsGetValue
ExitProcess
LCMapStringA
LCMapStringW
GetACP
GetOEMCP
GetCPInfo
GetStringTypeA
GetStringTypeW
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
SetUnhandledExceptionFilter
user32
LoadStringA
DefWindowProcA
PostQuitMessage
UpdateWindow
ShowWindow
FindWindowA
KillTimer
PostMessageA
CreateWindowExA
SetTimer
SendMessageA
GetMessageA
TranslateMessage
DispatchMessageA
LoadIconA
RegisterClassA
winspool.drv
EnumPrintersA
ClosePrinter
GetPrinterDriverA
OpenPrinterA
EnumPrinterDriversA
GetPrinterDriverDirectoryA
GetPrinterA
SetPrinterA
AddMonitorA
DeleteMonitorA
AddPrinterDriverA
advapi32
EqualSid
LookupAccountSidA
CreateProcessAsUserA
InitializeAcl
AddAccessAllowedAce
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
GetLengthSid
CopySid
RegGetKeySecurity
GetSecurityDescriptorDacl
GetAclInformation
GetSidSubAuthorityCount
GetAce
GetSidSubAuthority
RegSetKeySecurity
RegDeleteKeyA
RegSetValueExA
RegDeleteValueA
RegEnumValueA
RegEnumKeyExA
RegOpenKeyExA
RegCreateKeyExA
OpenThreadToken
OpenProcessToken
GetTokenInformation
AllocateAndInitializeSid
FreeSid
RegOpenKeyA
RegQueryValueExA
RegCloseKey
shell32
SHGetSpecialFolderLocation
SHGetPathFromIDListA
Sections
.text Size: 120KB - Virtual size: 120KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ