Static task
static1
Behavioral task
behavioral1
Sample
84787eedf21b85fd6cdf4e7030b337bcb05bd72bd3785f4487fa3f43e419471a.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
84787eedf21b85fd6cdf4e7030b337bcb05bd72bd3785f4487fa3f43e419471a.exe
Resource
win10v2004-20230703-en
General
-
Target
84787eedf21b85fd6cdf4e7030b337bcb05bd72bd3785f4487fa3f43e419471a
-
Size
3.8MB
-
MD5
f3a4573d245d2d022fe3bb666687c874
-
SHA1
b53f1b0eede43e70ddd70cc76c022abd4827a66b
-
SHA256
84787eedf21b85fd6cdf4e7030b337bcb05bd72bd3785f4487fa3f43e419471a
-
SHA512
87251cc8e900b0d3da396f6242ec8ebbbcc3a7c638098b2d68984af5abc60c80a6d127921d574902a44c8734527b184be2218fe61dffe7a29bdfe27f142d26d6
-
SSDEEP
98304:9NAsIB8z1vUGh6GOW+szR1rTY7yll/27v9I+Rb0:9iTQ6GOZsN1rTay7gZb0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 84787eedf21b85fd6cdf4e7030b337bcb05bd72bd3785f4487fa3f43e419471a
Files
-
84787eedf21b85fd6cdf4e7030b337bcb05bd72bd3785f4487fa3f43e419471a.exe windows x86
cc49f36b1a799e580e5be7648e0bc499
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateDirectoryW
CreateThread
GetTempPathW
SetFilePointer
LocalFileTimeToFileTime
SystemTimeToFileTime
SetFileTime
WriteFile
MulDiv
LocalFree
FormatMessageW
GetWindowsDirectoryW
GetEnvironmentVariableW
DeleteFileW
CopyFileW
MoveFileW
FindClose
FindNextFileW
FindFirstFileW
LoadLibraryW
SetErrorMode
GetProcAddress
FreeLibrary
GetCurrentProcess
GetModuleFileNameW
GetModuleHandleW
GetCommandLineA
GetStartupInfoA
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
GetLastError
HeapFree
RtlUnwind
LCMapStringA
LCMapStringW
Sleep
ExitProcess
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetStringTypeA
GetStringTypeW
LeaveCriticalSection
EnterCriticalSection
GetLocaleInfoA
HeapSize
VirtualAlloc
HeapReAlloc
LoadLibraryA
InitializeCriticalSectionAndSpinCount
MultiByteToWideChar
WideCharToMultiByte
lstrcpynW
GetFullPathNameW
GetFileSize
ReadFile
CloseHandle
CreateFileW
GetFileAttributesW
RaiseException
GetSystemDefaultLangID
user32
IsDlgButtonChecked
CheckDlgButton
ShowWindow
SetWindowPos
GetWindowRect
GetDesktopWindow
PostMessageW
SetClassLongW
DestroyMenu
TrackPopupMenu
AppendMenuW
CreatePopupMenu
GetWindowTextW
EndDialog
LoadIconW
DialogBoxParamW
OemToCharBuffA
LoadCursorW
SetCursor
GetSystemMetrics
GetClientRect
GetDlgItemTextW
GetActiveWindow
MessageBoxW
SendMessageW
FindWindowA
GetWindowTextA
SetWindowTextA
GetDC
ReleaseDC
GetDlgItem
GetCursorPos
SetDlgItemTextW
SetWindowTextW
SetDlgItemTextA
gdi32
CreateFontIndirectW
GetDeviceCaps
advapi32
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
RegCreateKeyExW
RegSetValueExW
shell32
SHGetSpecialFolderLocation
SHFileOperationW
SHGetMalloc
SHGetDesktopFolder
SHBrowseForFolderW
SHGetPathFromIDListW
ole32
OleUninitialize
CoCreateInstance
OleInitialize
comctl32
ord17
Sections
.text Size: 67KB - Virtual size: 67KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ