Static task
static1
Behavioral task
behavioral1
Sample
75dc16702d260c8f77019c5a1f6d5906a693496b7ace234826df730611598ecd.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
75dc16702d260c8f77019c5a1f6d5906a693496b7ace234826df730611598ecd.exe
Resource
win10v2004-20230831-en
General
-
Target
75dc16702d260c8f77019c5a1f6d5906a693496b7ace234826df730611598ecd
-
Size
129KB
-
MD5
7670fcaf56e265dd8678b8eb356d8cff
-
SHA1
62ef39e02bfc8346e040ab3b5c9c65e318215c5d
-
SHA256
75dc16702d260c8f77019c5a1f6d5906a693496b7ace234826df730611598ecd
-
SHA512
acd87b8a5a1c8a320d259670d486c668ec2e38f6f1d7f029bf9b4010d8c3b00972debde6f45b386798b9766b02998e7de650bb555990d85fa5724df3db081f38
-
SSDEEP
3072:Qu/guB0byemiSEywPlPERM322sbwgyqU3RJOsm/Tf:Qu/guB0byemiSEywPlPERM32xwgyfJmz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 75dc16702d260c8f77019c5a1f6d5906a693496b7ace234826df730611598ecd
Files
-
75dc16702d260c8f77019c5a1f6d5906a693496b7ace234826df730611598ecd.exe windows x86
a92b34ca8324bbb7220251440165f586
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
comctl32
InitCommonControlsEx
kernel32
DeleteCriticalSection
EnterCriticalSection
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetLastError
GetModuleHandleA
GetProcAddress
GetStartupInfoA
GetSystemTimeAsFileTime
GetTickCount
GetUserDefaultUILanguage
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryW
QueryPerformanceCounter
SetUnhandledExceptionFilter
Sleep
TerminateProcess
TlsGetValue
UnhandledExceptionFilter
VirtualProtect
VirtualQuery
msvcrt
__dllonexit
__getmainargs
__initenv
__lconv_init
__set_app_type
__setusermatherr
_acmdln
_amsg_exit
_cexit
_fpreset
_initterm
_iob
_lock
_onexit
_unlock
abort
atoi
calloc
exit
free
fwrite
malloc
memmove
signal
strncmp
vfprintf
shell32
SHAppBarMessage
Shell_NotifyIconA
gdi32
BitBlt
CreateCompatibleBitmap
CreateCompatibleDC
DeleteDC
DeleteObject
GetStockObject
SelectObject
StretchBlt
user32
BeginPaint
ClientToScreen
CreateDialogParamA
CreateWindowExA
DefWindowProcA
DestroyIcon
DestroyMenu
DestroyWindow
DialogBoxParamA
DispatchMessageA
DrawIcon
EndDialog
EndPaint
FillRect
GetCapture
GetClientRect
GetCursorInfo
GetCursorPos
GetDC
GetDesktopWindow
GetDlgItem
GetGUIThreadInfo
GetIconInfo
GetMessageA
GetMonitorInfoA
GetSubMenu
GetWindowLongA
GetWindowRect
IntersectRect
InvalidateRgn
IsDlgButtonChecked
IsIconic
KillTimer
LoadAcceleratorsA
LoadCursorA
LoadIconA
LoadImageA
LoadMenuA
LoadStringA
MessageBoxA
MonitorFromRect
OffsetRect
PostMessageA
PostQuitMessage
RegisterClassA
ReleaseCapture
ReleaseDC
RemoveMenu
SendDlgItemMessageA
SendMessageA
SetCapture
SetProcessDefaultLayout
SetTimer
SetWindowLongA
SetWindowPos
ShowWindow
SystemParametersInfoA
TrackPopupMenu
TranslateAcceleratorA
TranslateMessage
Sections
.text Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 144B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1024B - Virtual size: 620B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 1KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 52B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 73KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rossym Size: 33KB - Virtual size: 32KB
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ