Static task
static1
Behavioral task
behavioral1
Sample
d790970af9edf241621f0b45224e5ee6387b74db736d1336194d9600daea1484.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
d790970af9edf241621f0b45224e5ee6387b74db736d1336194d9600daea1484.exe
Resource
win10v2004-20230915-en
General
-
Target
d790970af9edf241621f0b45224e5ee6387b74db736d1336194d9600daea1484
-
Size
9.1MB
-
MD5
58423ab6f75da1b58d072993c874cd3a
-
SHA1
3e72d90d992d255d0b8069a8963e25b19baaca3c
-
SHA256
d790970af9edf241621f0b45224e5ee6387b74db736d1336194d9600daea1484
-
SHA512
4a95b4b5a0ebfebd0947acf5edd5ec8cd7910b40d8960342d75674944465aed379fe584a98dfa1f5987e8d824c880067680b91e7533208a9d32ea0c554b3fcf7
-
SSDEEP
196608:aMfesav7V1GuCwTdPa/LwpVP8nlYIFqORMyRoIn6hHYZS7p0fju:QRTV1WwTQigDQfyGInQHn7ufj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d790970af9edf241621f0b45224e5ee6387b74db736d1336194d9600daea1484
Files
-
d790970af9edf241621f0b45224e5ee6387b74db736d1336194d9600daea1484.exe windows:4 windows x86
667de3a0b2c4f71884e9fcb7150f570c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcatA
GetTempPathA
MultiByteToWideChar
GetCommandLineA
CreateProcessA
GetCurrentDirectoryA
GetModuleFileNameA
MulDiv
SetCurrentDirectoryA
GetSystemDirectoryA
lstrlenA
WriteFile
GetEnvironmentStrings
LoadLibraryA
GetProcAddress
GetStringTypeW
GetStringTypeA
IsBadCodePtr
IsBadWritePtr
IsBadReadPtr
SetUnhandledExceptionFilter
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetFileType
GetStdHandle
SetHandleCount
GetOEMCP
GetACP
GetCPInfo
GetEnvironmentStringsW
LockResource
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
LCMapStringW
LCMapStringA
WideCharToMultiByte
HeapAlloc
CloseHandle
HeapFree
ExitProcess
lstrcpyA
WaitForSingleObject
GetVersion
GetStartupInfoA
GetModuleHandleA
RtlUnwind
SizeofResource
CreateFileA
FindResourceA
LoadResource
user32
GetKeyboardLayoutList
GetMessageA
LoadIconA
SetWindowLongA
PostMessageA
BringWindowToTop
DialogBoxParamA
DestroyIcon
EndPaint
GetDC
ReleaseDC
ShowWindow
CreateDialogParamA
CreateIconFromResource
BeginPaint
CallWindowProcA
LoadStringA
UnloadKeyboardLayout
DispatchMessageA
TranslateMessage
IsDialogMessageA
GetSysColor
GetWindowLongA
DrawIcon
MessageBoxA
DialogBoxIndirectParamA
UpdateWindow
SendMessageA
GetClientRect
LoadBitmapA
GetCursorPos
ScreenToClient
InflateRect
DrawFocusRect
GetDlgItem
SetWindowPos
FillRect
GetSystemMetrics
SetWindowTextA
EndDialog
DestroyWindow
CreateDialogIndirectParamA
gdi32
SetBkMode
GetDeviceCaps
DeleteObject
TextOutA
SetTextColor
SelectObject
CreateFontA
CreateSolidBrush
DeleteDC
BitBlt
CreateCompatibleDC
GetObjectA
advapi32
RegOpenKeyExA
RegDeleteKeyA
RegCloseKey
RegSetValueExA
RegCreateKeyExA
shell32
SHGetPathFromIDListA
SHGetSpecialFolderLocation
ole32
CoInitialize
CoCreateInstance
imm32
ImmGetIMEFileNameA
version
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
Sections
.text Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 9.0MB - Virtual size: 9.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ