Static task
static1
Behavioral task
behavioral1
Sample
237e601101a215b07ddb07f32ed81cb4edcd6306e3f8afd910e445a60188f15b.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
237e601101a215b07ddb07f32ed81cb4edcd6306e3f8afd910e445a60188f15b.exe
Resource
win10v2004-20230703-en
General
-
Target
237e601101a215b07ddb07f32ed81cb4edcd6306e3f8afd910e445a60188f15b
-
Size
202KB
-
MD5
a887f84185a2535b8568746ffee5f2c5
-
SHA1
2e0dd3f78ed39d5c4727d9422c140cf8c4053fb6
-
SHA256
237e601101a215b07ddb07f32ed81cb4edcd6306e3f8afd910e445a60188f15b
-
SHA512
9fa5082314c4defe6b84cc0eeb0d7b4a7cdd5bc3aca92242c2c6acb787c5ceb91c2bcf5c074dd13854668b08743608c4a5e6b8cd33cd09d6e45828fee6654396
-
SSDEEP
1536:Guop1tl5fZCQmOKLC5uFQ/uH5tzxgEmIzPPnbrM+sGBouvCpJIVgzV5:lojtl5f4QmOKLiusyPPHM+1BuJIk
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 237e601101a215b07ddb07f32ed81cb4edcd6306e3f8afd910e445a60188f15b
Files
-
237e601101a215b07ddb07f32ed81cb4edcd6306e3f8afd910e445a60188f15b.exe windows x86
6698b05898cdbf79eb3c03f9030ff3cc
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mfc100
ord3395
ord11017
ord8235
ord13973
ord13972
ord14045
ord14062
ord14058
ord14060
ord14061
ord14059
ord2417
ord7348
ord2878
ord2881
ord12535
ord5534
ord2762
ord7520
ord4429
ord4430
ord5445
ord11348
ord1524
ord12488
ord5257
ord12486
ord5256
ord10395
ord5273
ord7945
ord8441
ord10751
ord10746
ord4736
ord3400
ord4076
ord10459
ord9422
ord1276
ord11038
ord1294
ord7590
ord3548
ord3892
ord3890
ord12415
ord8392
ord6690
ord888
ord6112
ord8304
ord9281
ord5098
ord11787
ord11153
ord11184
ord9449
ord7355
ord4078
ord11180
ord11172
ord5238
ord3409
ord13481
ord13484
ord13482
ord13485
ord13480
ord13483
ord7144
ord11413
ord13181
ord10922
ord14075
ord1732
ord7091
ord11806
ord3618
ord3676
ord8486
ord13299
ord7073
ord13301
ord11421
ord11420
ord2163
ord4724
ord13767
ord11726
ord7510
ord7584
ord1288
ord381
ord5803
ord8305
ord11060
ord5253
ord12482
ord8351
ord11107
ord11025
ord2416
ord7349
ord12531
ord5532
ord2752
ord2973
ord2974
ord3620
ord9475
ord10360
ord10007
ord6217
ord11067
ord946
ord6678
ord6835
ord9185
ord9188
ord9192
ord12868
ord12962
ord921
ord11179
ord10967
ord345
ord1586
ord850
ord7576
ord12672
ord1890
ord6328
ord6686
ord404
ord8307
ord9282
ord13735
ord12805
ord12608
ord2502
ord4961
ord5514
ord8178
ord10883
ord10016
ord10244
ord8292
ord11648
ord4930
ord11453
ord14124
ord14042
ord14129
ord13656
ord13875
ord13651
ord13852
ord13863
ord13717
ord8570
ord2374
ord11822
ord11029
ord3662
ord3616
ord13223
ord4744
ord4735
ord9447
ord14043
ord13803
ord13804
ord13783
ord13814
ord13784
ord963
ord9968
ord3406
ord6622
ord1284
ord266
ord8321
ord2337
ord6127
ord11154
ord11024
ord7437
ord10253
ord10256
ord8595
ord8610
ord8600
ord9030
ord9034
ord8612
ord10109
ord9512
ord8031
ord8021
ord10697
ord10134
ord9094
ord11059
ord3655
ord5837
ord901
ord1982
ord1448
ord4283
ord316
ord3439
ord6054
ord2184
ord5776
ord7927
ord7491
ord4340
ord3390
ord265
ord884
ord11939
ord7871
ord11940
ord6831
ord9190
ord9191
ord9994
ord8332
ord2847
ord12644
ord11190
ord11188
ord1496
ord1503
ord1509
ord1507
ord1514
ord4373
ord4410
ord4381
ord4393
ord4389
ord4385
ord4415
ord4406
ord4377
ord4419
ord4398
ord4364
ord4368
ord4401
ord3991
ord13980
ord3984
ord2661
ord13302
ord7074
ord13300
ord6128
ord10672
ord12479
ord5252
ord2338
ord3484
ord2945
ord2944
ord2846
ord11103
ord4622
ord4903
ord5095
ord8439
ord4881
ord5123
ord4625
ord4774
ord4606
ord6897
ord6898
ord6888
ord4772
ord7357
ord9286
ord8308
ord433
ord865
ord877
ord13294
ord8070
ord11112
ord3985
ord3414
ord2215
ord985
ord1264
ord6344
ord8137
ord1296
msvcr100
__CxxFrameHandler3
_controlfp_s
_invoke_watson
_except_handler4_common
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_crt_debugger_hook
__set_app_type
_fmode
_commode
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
_exit
_cexit
__getmainargs
_amsg_exit
?terminate@@YAXXZ
_onexit
_lock
__dllonexit
_unlock
floor
_purecall
_CxxThrowException
memset
memcpy
kernel32
GetProcAddress
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
IsProcessorFeaturePresent
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetStartupInfoW
HeapSetInformation
InterlockedCompareExchange
Sleep
InterlockedExchange
DecodePointer
EncodePointer
InterlockedDecrement
InterlockedIncrement
HeapAlloc
FreeLibrary
VirtualFree
GetProcessHeap
HeapFree
VirtualAlloc
LoadLibraryA
user32
ReleaseDC
GetDC
EnableWindow
UpdateWindow
RedrawWindow
gdi32
Ellipse
CreatePen
Sections
.text Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 79KB - Virtual size: 79KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 94KB - Virtual size: 94KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ