Static task
static1
Behavioral task
behavioral1
Sample
d51180a7427b4046259402f975947635609be17d16d77cdc3874b322671d1071.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
d51180a7427b4046259402f975947635609be17d16d77cdc3874b322671d1071.exe
Resource
win10v2004-20230703-en
General
-
Target
d51180a7427b4046259402f975947635609be17d16d77cdc3874b322671d1071
-
Size
1.3MB
-
MD5
ee63bcfb457971b4557115092e18a4c3
-
SHA1
d929567eee7b55f23808daeba748be7acdc030b1
-
SHA256
d51180a7427b4046259402f975947635609be17d16d77cdc3874b322671d1071
-
SHA512
1dc732a527080e7e6ff2c596f0bd72270abd7e46ae3ecfe91bdd881ea53961ad99bbea7fb7bb52580d5f7a2dca75469e5f3d657a8fa676bba125d7e19039ac97
-
SSDEEP
24576:Pm0UAfUGvQvqRDL7YeahdQ1tu8H1F6rv6m4wh6ZzfcsUDRP47rt7K:PtUGvEqR/7/I8HXYl4wYzfDUDRP4I
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d51180a7427b4046259402f975947635609be17d16d77cdc3874b322671d1071
Files
-
d51180a7427b4046259402f975947635609be17d16d77cdc3874b322671d1071.exe windows x86
cc49f36b1a799e580e5be7648e0bc499
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateDirectoryW
CreateThread
GetTempPathW
SetFilePointer
LocalFileTimeToFileTime
SystemTimeToFileTime
SetFileTime
WriteFile
MulDiv
LocalFree
FormatMessageW
GetWindowsDirectoryW
GetEnvironmentVariableW
DeleteFileW
CopyFileW
MoveFileW
FindClose
FindNextFileW
FindFirstFileW
LoadLibraryW
SetErrorMode
GetProcAddress
FreeLibrary
GetCurrentProcess
GetModuleFileNameW
GetModuleHandleW
GetCommandLineA
GetStartupInfoA
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
GetLastError
HeapFree
RtlUnwind
LCMapStringA
LCMapStringW
Sleep
ExitProcess
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetStringTypeA
GetStringTypeW
LeaveCriticalSection
EnterCriticalSection
GetLocaleInfoA
HeapSize
VirtualAlloc
HeapReAlloc
LoadLibraryA
InitializeCriticalSectionAndSpinCount
MultiByteToWideChar
WideCharToMultiByte
lstrcpynW
GetFullPathNameW
GetFileSize
ReadFile
CloseHandle
CreateFileW
GetFileAttributesW
RaiseException
GetSystemDefaultLangID
user32
IsDlgButtonChecked
CheckDlgButton
ShowWindow
SetWindowPos
GetWindowRect
GetDesktopWindow
PostMessageW
SetClassLongW
DestroyMenu
TrackPopupMenu
AppendMenuW
CreatePopupMenu
GetWindowTextW
EndDialog
LoadIconW
DialogBoxParamW
OemToCharBuffA
LoadCursorW
SetCursor
GetSystemMetrics
GetClientRect
GetDlgItemTextW
GetActiveWindow
MessageBoxW
SendMessageW
FindWindowA
GetWindowTextA
SetWindowTextA
GetDC
ReleaseDC
GetDlgItem
GetCursorPos
SetDlgItemTextW
SetWindowTextW
SetDlgItemTextA
gdi32
CreateFontIndirectW
GetDeviceCaps
advapi32
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
RegCreateKeyExW
RegSetValueExW
shell32
SHGetSpecialFolderLocation
SHFileOperationW
SHGetMalloc
SHGetDesktopFolder
SHBrowseForFolderW
SHGetPathFromIDListW
ole32
OleUninitialize
CoCreateInstance
OleInitialize
comctl32
ord17
Sections
.text Size: 67KB - Virtual size: 67KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ