Static task
static1
Behavioral task
behavioral1
Sample
c074411dff7ab512e037288ad4aeee757aceeeddebaf2c7bb6434f25c71cc16e.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
c074411dff7ab512e037288ad4aeee757aceeeddebaf2c7bb6434f25c71cc16e.exe
Resource
win10v2004-20230703-en
General
-
Target
c074411dff7ab512e037288ad4aeee757aceeeddebaf2c7bb6434f25c71cc16e
-
Size
268KB
-
MD5
95ccd964d9fee4b8ea49f5dad9bb9321
-
SHA1
4467b7209a291e3ec8746468650dee4c95d49f7c
-
SHA256
c074411dff7ab512e037288ad4aeee757aceeeddebaf2c7bb6434f25c71cc16e
-
SHA512
7869361a1a2c94052a7cff4b13b1a37b337841eed606bd4a56902b5668a038b3a275ef37e6d949b872cfd799dda036f587d03fd685db881bf2b71b47076b2b42
-
SSDEEP
6144:8Q3OFfk7TPhu1Nq++++6++++6++++6++++6++++6++++l++++t++++t++++t+++g:PJPhANq++++6++++6++++6++++6++++q
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c074411dff7ab512e037288ad4aeee757aceeeddebaf2c7bb6434f25c71cc16e
Files
-
c074411dff7ab512e037288ad4aeee757aceeeddebaf2c7bb6434f25c71cc16e.exe windows x86
9a141e3c83597244fadfb104b7c928ea
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mfc100
ord14060
ord14061
ord14059
ord2416
ord7349
ord2878
ord2881
ord12531
ord5532
ord2752
ord2973
ord2974
ord3620
ord9475
ord10360
ord10007
ord8137
ord11067
ord946
ord3241
ord3361
ord3238
ord3366
ord12344
ord4785
ord6678
ord1294
ord7590
ord6344
ord1264
ord985
ord877
ord865
ord433
ord8308
ord5252
ord12479
ord8332
ord2215
ord3985
ord11112
ord11017
ord2417
ord7348
ord12535
ord5534
ord2762
ord7520
ord4429
ord4430
ord5445
ord11348
ord1524
ord12488
ord5257
ord12486
ord5256
ord10395
ord5273
ord7945
ord8441
ord10751
ord10746
ord4736
ord3400
ord4076
ord10459
ord9422
ord1276
ord3548
ord3892
ord3890
ord12415
ord8392
ord11038
ord6690
ord888
ord6112
ord8304
ord9281
ord5098
ord11787
ord11153
ord11184
ord9449
ord7355
ord4078
ord11180
ord11172
ord5238
ord3409
ord13481
ord13484
ord13482
ord13485
ord13480
ord13483
ord7144
ord11413
ord13181
ord10922
ord14075
ord1732
ord7091
ord11806
ord3618
ord3676
ord8486
ord13299
ord7073
ord13301
ord11421
ord13294
ord2163
ord4724
ord13767
ord11726
ord7510
ord7584
ord1288
ord12868
ord12962
ord921
ord11179
ord10967
ord345
ord1586
ord850
ord7576
ord12672
ord1890
ord6835
ord9185
ord9188
ord9192
ord6328
ord6686
ord404
ord8307
ord9282
ord13735
ord12805
ord12608
ord2502
ord14058
ord5514
ord8178
ord3414
ord10016
ord10244
ord8292
ord11648
ord4930
ord11453
ord14124
ord14042
ord14129
ord13656
ord13875
ord13651
ord13852
ord13863
ord13717
ord8570
ord2374
ord11822
ord11029
ord3662
ord3616
ord13223
ord4744
ord4735
ord9447
ord14043
ord13803
ord13804
ord13783
ord13814
ord13784
ord3406
ord963
ord9968
ord5837
ord901
ord1982
ord4283
ord316
ord3439
ord6054
ord2184
ord4340
ord6622
ord884
ord8321
ord2337
ord6127
ord11154
ord11024
ord7437
ord10253
ord10256
ord8595
ord8610
ord8600
ord9030
ord9034
ord8612
ord10109
ord9512
ord8031
ord8021
ord10697
ord10134
ord9094
ord1284
ord11059
ord3655
ord7491
ord7927
ord11940
ord266
ord265
ord6831
ord9190
ord9191
ord8070
ord11107
ord6217
ord9994
ord8351
ord2847
ord12644
ord11190
ord11188
ord1496
ord1503
ord1509
ord1507
ord1514
ord4373
ord4410
ord4381
ord4393
ord4389
ord4385
ord4415
ord4406
ord4377
ord4419
ord4398
ord4364
ord4368
ord4401
ord3991
ord13980
ord3984
ord2661
ord13302
ord7074
ord13300
ord6128
ord10672
ord12482
ord5253
ord2338
ord11060
ord3484
ord2945
ord2944
ord2846
ord11103
ord4622
ord4903
ord5095
ord8439
ord4881
ord5123
ord4625
ord4774
ord4606
ord6897
ord6898
ord6888
ord4772
ord7357
ord9286
ord8305
ord5803
ord14062
ord14045
ord13972
ord13973
ord8235
ord11025
ord3395
ord4961
ord10883
ord381
ord3390
ord11420
ord1296
msvcr100
_invoke_watson
_controlfp_s
__CxxFrameHandler3
_except_handler4_common
_crt_debugger_hook
?_type_info_dtor_internal_method@type_info@@QAEXXZ
__set_app_type
_fmode
_commode
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
_exit
_cexit
__getmainargs
_amsg_exit
?terminate@@YAXXZ
_onexit
_lock
__dllonexit
_unlock
_CIcos
_CIsin
floor
_purecall
_CxxThrowException
memset
memcpy
kernel32
HeapSetInformation
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
IsProcessorFeaturePresent
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetStartupInfoW
GetProcAddress
InterlockedCompareExchange
Sleep
InterlockedExchange
DecodePointer
EncodePointer
InterlockedDecrement
InterlockedIncrement
HeapAlloc
FreeLibrary
VirtualFree
GetProcessHeap
HeapFree
VirtualAlloc
LoadLibraryA
user32
ReleaseDC
GetDC
GetClientRect
OffsetRect
UpdateWindow
EnableWindow
SendMessageA
RedrawWindow
gdi32
CreatePen
Sections
.text Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 79KB - Virtual size: 79KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 160KB - Virtual size: 160KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ