Static task
static1
Behavioral task
behavioral1
Sample
21fb0d8a4f0215aa13d63482263a703b8e4908adf6bea9202e3d90e876ba897c.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
21fb0d8a4f0215aa13d63482263a703b8e4908adf6bea9202e3d90e876ba897c.exe
Resource
win10v2004-20230703-en
General
-
Target
21fb0d8a4f0215aa13d63482263a703b8e4908adf6bea9202e3d90e876ba897c
-
Size
428KB
-
MD5
8dcb004622df86ef623c005d89367829
-
SHA1
e3afc729e22f5c144f6678b1adaf3e2e70b2a70a
-
SHA256
21fb0d8a4f0215aa13d63482263a703b8e4908adf6bea9202e3d90e876ba897c
-
SHA512
fe42280c132759091c48317d911a5122e6c6b7a6119e7ae73cf3de9d74c5c07cb3b968d55f6f0b52551f13fd6c6ce97543bca41671a3acbb24171c8d8333f643
-
SSDEEP
6144:R6qqqqqqqqPObWr6d/Ah3YBJLVhxk7TPhu1NV:Yqqqqqqqq/64tYzLCPhAN
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 21fb0d8a4f0215aa13d63482263a703b8e4908adf6bea9202e3d90e876ba897c
Files
-
21fb0d8a4f0215aa13d63482263a703b8e4908adf6bea9202e3d90e876ba897c.exe windows x86
f651f4bd95d3bfd7e8d81f0298e2ba51
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mfc100
ord6217
ord2215
ord3985
ord11112
ord8070
ord13294
ord10883
ord3395
ord11017
ord8235
ord13973
ord13972
ord14045
ord14062
ord14058
ord14060
ord14061
ord14059
ord2417
ord7348
ord2878
ord2881
ord12535
ord5534
ord2762
ord7520
ord4429
ord4430
ord5445
ord11348
ord1524
ord12488
ord5257
ord12486
ord5256
ord10395
ord5273
ord7945
ord8441
ord10751
ord10746
ord4736
ord3400
ord4076
ord10459
ord9422
ord1276
ord11038
ord7590
ord3548
ord3892
ord3890
ord12415
ord8392
ord6690
ord888
ord6112
ord8304
ord9281
ord5098
ord11787
ord11153
ord11184
ord9449
ord7355
ord4078
ord11180
ord11172
ord5238
ord3409
ord13481
ord13484
ord13482
ord13485
ord13480
ord13483
ord7144
ord11413
ord13181
ord10922
ord14075
ord1732
ord7091
ord11806
ord3618
ord3676
ord8486
ord13299
ord7073
ord13301
ord11421
ord11420
ord2163
ord4724
ord13767
ord11726
ord7510
ord7584
ord1288
ord381
ord5803
ord8305
ord11060
ord5253
ord12482
ord8351
ord11107
ord11025
ord2416
ord7349
ord1496
ord5532
ord2752
ord2973
ord2974
ord3620
ord9475
ord10360
ord10007
ord8137
ord11067
ord946
ord6678
ord6835
ord9185
ord9188
ord9192
ord12868
ord12962
ord921
ord11179
ord10967
ord345
ord1586
ord850
ord7576
ord12672
ord1890
ord6328
ord9994
ord404
ord8307
ord9282
ord13735
ord12805
ord12608
ord2502
ord4961
ord5514
ord8178
ord3414
ord10016
ord10244
ord8292
ord11648
ord4930
ord11453
ord14124
ord14042
ord14129
ord13656
ord13875
ord13651
ord13852
ord13863
ord13717
ord8570
ord2374
ord11822
ord11029
ord3662
ord3616
ord13223
ord4744
ord4735
ord9447
ord14043
ord13803
ord13804
ord13783
ord13814
ord13784
ord963
ord9968
ord3406
ord6622
ord1284
ord884
ord8321
ord2337
ord6127
ord11154
ord11024
ord7437
ord10253
ord10256
ord8595
ord8610
ord8600
ord9030
ord9034
ord8612
ord10109
ord8031
ord8021
ord10697
ord10134
ord9094
ord11059
ord3655
ord9512
ord5786
ord5280
ord10006
ord8136
ord3619
ord344
ord6831
ord9190
ord9191
ord1503
ord1509
ord1507
ord1514
ord4373
ord4410
ord4381
ord4393
ord4389
ord4385
ord4415
ord4406
ord4377
ord4419
ord4398
ord4364
ord4368
ord4401
ord3991
ord13980
ord3984
ord2661
ord13302
ord7074
ord13300
ord6128
ord10672
ord12479
ord5252
ord2338
ord3484
ord2945
ord2944
ord2846
ord11103
ord4622
ord4903
ord5095
ord8439
ord4881
ord5123
ord4625
ord4774
ord4606
ord6897
ord6898
ord6888
ord4772
ord7357
ord9286
ord8308
ord433
ord865
ord877
ord985
ord1264
ord6344
ord265
ord8332
ord2847
ord12644
ord11190
ord6686
ord11188
ord1294
ord266
ord12531
ord1296
msvcr100
_invoke_watson
_controlfp_s
__CxxFrameHandler3
_except_handler4_common
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_crt_debugger_hook
__set_app_type
_fmode
_commode
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
_exit
_cexit
__getmainargs
_amsg_exit
_onexit
_lock
__dllonexit
_unlock
?terminate@@YAXXZ
_purecall
memset
memcpy
_CxxThrowException
floor
kernel32
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
IsProcessorFeaturePresent
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
GetProcAddress
GetStartupInfoW
HeapSetInformation
InterlockedCompareExchange
InterlockedExchange
DecodePointer
EncodePointer
InterlockedDecrement
InterlockedIncrement
Sleep
FreeLibrary
VirtualFree
VirtualAlloc
LoadLibraryA
user32
GetClientRect
OffsetRect
EnableWindow
UpdateWindow
InvalidateRect
gdi32
SetPixelV
Sections
.text Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 291KB - Virtual size: 291KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 99KB - Virtual size: 98KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ