Static task
static1
Behavioral task
behavioral1
Sample
7869d3fb0f0409bf14a9fb78bd5a59f8b7272fb63680de13926e739c97d4d0e5.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
7869d3fb0f0409bf14a9fb78bd5a59f8b7272fb63680de13926e739c97d4d0e5.exe
Resource
win10v2004-20230915-en
General
-
Target
7869d3fb0f0409bf14a9fb78bd5a59f8b7272fb63680de13926e739c97d4d0e5
-
Size
91KB
-
MD5
991f4b6958f9e3f4d9117bc5c3f24b7b
-
SHA1
a29078c068c37c2b20718f3b2cf05f353577c53c
-
SHA256
7869d3fb0f0409bf14a9fb78bd5a59f8b7272fb63680de13926e739c97d4d0e5
-
SHA512
352835ae47c4ea8b01263c22a07cfd8f02674970680b7af6c78bb4b1b33c74635f4c8d4f7db6fbe671b703664f664c03aa8022ce0434537cef127af6f6c71458
-
SSDEEP
1536:WNUkgyL5h+hIm2JD22d/p0nDLliuvRP+d1ZWn1y78:WNUkgyr+herunDh/v2rWn1y78
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7869d3fb0f0409bf14a9fb78bd5a59f8b7272fb63680de13926e739c97d4d0e5
Files
-
7869d3fb0f0409bf14a9fb78bd5a59f8b7272fb63680de13926e739c97d4d0e5.exe windows:5 windows x64
da1121e85a09429bc813bf9b60ae032c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
advapi32
RegEnumValueW
RegOpenKeyExW
RegQueryInfoKeyW
RegCloseKey
comctl32
InitCommonControls
ImageList_Create
ImageList_Destroy
ImageList_AddMasked
comdlg32
GetOpenFileNameW
user32
MoveWindow
CharLowerBuffW
CheckMenuItem
CreateWindowExW
DefWindowProcW
UpdateWindow
TranslateMessage
TranslateAcceleratorW
ShowWindow
SetWindowTextW
SetTimer
SetProcessDefaultLayout
SetParent
SendMessageW
RegisterClassExW
PostQuitMessage
MessageBoxW
LoadStringW
LoadImageW
LoadIconW
LoadCursorW
LoadAcceleratorsW
KillTimer
InsertMenuItemW
GetWindowRect
GetSystemMetrics
GetSubMenu
GetMessageW
GetMenuItemInfoW
GetMenu
GetClientRect
EnableMenuItem
DispatchMessageW
DestroyAcceleratorTable
PostMessageW
winmm
mciGetErrorStringW
mciSendCommandW
shell32
DragFinish
ShellAboutW
DragQueryFileW
DragAcceptFiles
ShellExecuteW
msvcrt
_fpreset
_amsg_exit
__lconv_init
signal
_wcmdln
__winitenv
_initterm
__setusermatherr
_cexit
__wgetmainargs
memcpy
__wargv
exit
_vsnwprintf
__set_app_type
free
malloc
memset
wcscmp
wcsrchr
kernel32
TlsGetValue
LeaveCriticalSection
InitializeCriticalSection
EnterCriticalSection
DeleteCriticalSection
LoadLibraryW
GetModuleHandleA
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
Sleep
SetUnhandledExceptionFilter
GetStartupInfoW
GetProcAddress
GetUserDefaultUILanguage
SearchPathW
LocalFree
GetLastError
GetFileAttributesW
FormatMessageW
Sections
.text Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 1024B - Virtual size: 792B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 61KB - Virtual size: 61KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 28B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ