Static task
static1
Behavioral task
behavioral1
Sample
879eea404018e13fcbac16f8403c5f7ff159314a1da5fb6aae81011016ad405d.exe
Resource
win7-20230824-en
Behavioral task
behavioral2
Sample
879eea404018e13fcbac16f8403c5f7ff159314a1da5fb6aae81011016ad405d.exe
Resource
win10v2004-20230703-en
General
-
Target
879eea404018e13fcbac16f8403c5f7ff159314a1da5fb6aae81011016ad405d
-
Size
247KB
-
MD5
a99d79b0caae416a084aaf6bf53a4b2b
-
SHA1
55edb672d90e96d55c3d2c7011cac81679345bb9
-
SHA256
879eea404018e13fcbac16f8403c5f7ff159314a1da5fb6aae81011016ad405d
-
SHA512
2c74d3bc6daa266d3c1b6a43520058caac1aeb793b173e8d0051b8d7f519c9b477962f162d7dcfce96990b9d023ff191a61be4fed55b290b5ba445afed0e2e66
-
SSDEEP
6144:Z0z8st37nV0My5fMdlEHqmJyO0NKav0yQqfe8:ZvslnVhyaLEKoONKc0yQo
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 879eea404018e13fcbac16f8403c5f7ff159314a1da5fb6aae81011016ad405d
Files
-
879eea404018e13fcbac16f8403c5f7ff159314a1da5fb6aae81011016ad405d.exe windows x86
87d239a4723aad714ef37ec160350014
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
CreateMutexW
DeleteCriticalSection
EnterCriticalSection
ExpandEnvironmentStringsW
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetFileAttributesW
GetLastError
GetLocaleInfoW
GetModuleFileNameW
GetModuleHandleA
GetPrivateProfileIntW
GetPrivateProfileSectionNamesW
GetPrivateProfileStringW
GetProcAddress
GetProcessHeap
GetStartupInfoW
GetSystemInfo
GetSystemTimeAsFileTime
GetTickCount
GetWindowsDirectoryW
HeapAlloc
HeapFree
HeapReAlloc
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryW
QueryPerformanceCounter
SetCurrentDirectoryW
SetUnhandledExceptionFilter
Sleep
TerminateProcess
TlsGetValue
UnhandledExceptionFilter
VirtualProtect
VirtualQuery
msvcrt
__dllonexit
__lconv_init
__set_app_type
__setusermatherr
__wgetmainargs
__winitenv
_amsg_exit
_cexit
_fmode
_fpreset
_initterm
_iob
_lock
_onexit
_unlock
_vsnwprintf
_wcmdln
_wcsicmp
_wcsnicmp
abort
calloc
exit
fprintf
free
fwrite
malloc
memmove
signal
strncmp
vfprintf
wcschr
wcslen
wcsrchr
wcstoul
shell32
ShellExecuteW
gdi32
BitBlt
CreateCompatibleDC
CreateFontIndirectW
CreatePen
CreateSolidBrush
DeleteDC
DeleteObject
GetObjectW
GetStockObject
LineTo
MoveToEx
PatBlt
SelectObject
SetBkMode
SetTextColor
user32
AdjustWindowRect
BeginPaint
CallWindowProcW
CreateWindowExW
DefWindowProcW
DestroyWindow
DispatchMessageW
DrawTextW
EndPaint
FindWindowW
GetDlgCtrlID
GetFocus
GetForegroundWindow
GetMessageW
GetParent
GetSysColor
GetSystemMenu
GetSystemMetrics
GetWindowDC
GetWindowLongW
GetWindowTextW
InflateRect
InvalidateRect
IsDialogMessageW
IsWindowEnabled
LoadBitmapW
LoadCursorW
LoadIconW
LoadStringW
MessageBoxW
OffsetRect
PostQuitMessage
RegisterClassExW
ReleaseDC
RemoveMenu
SendMessageW
SetFocus
SetForegroundWindow
SetWindowLongW
ShowWindow
TranslateMessage
UpdateWindow
Sections
.text Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 128B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
/4 Size: 512B - Virtual size: 20B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 3KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 52B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 182KB - Virtual size: 182KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rossym Size: 36KB - Virtual size: 36KB
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ