Static task
static1
Behavioral task
behavioral1
Sample
964f2cf52b88a0f8264e27353b5bba87e290ab9247c232be6fbd1e8c5ca725ee.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
964f2cf52b88a0f8264e27353b5bba87e290ab9247c232be6fbd1e8c5ca725ee.exe
Resource
win10v2004-20230915-en
General
-
Target
964f2cf52b88a0f8264e27353b5bba87e290ab9247c232be6fbd1e8c5ca725ee
-
Size
8.0MB
-
MD5
90d886379c069f60589f7d2ec0d61948
-
SHA1
62d73447f871f630b745aa4befebca9b4bf10321
-
SHA256
964f2cf52b88a0f8264e27353b5bba87e290ab9247c232be6fbd1e8c5ca725ee
-
SHA512
bf64440ef7403b6774ff49c41f92c94229987187aa94abc1c36bed3708054af347092090c47d6083f76974544a418d865909217283e63e9ed844171dd2bc93a3
-
SSDEEP
98304:oCTnVhaW4aPcnHoRGYptjNoidw2H3q7ZZP/RCaF2ULERoVmaxta2bUiPIiGtcXWx:oyVfMoRXXpvdw2XsxpPEuV5nW7FEO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 964f2cf52b88a0f8264e27353b5bba87e290ab9247c232be6fbd1e8c5ca725ee
Files
-
964f2cf52b88a0f8264e27353b5bba87e290ab9247c232be6fbd1e8c5ca725ee.exe windows:5 windows x86
beea444c50eb33cbdccad5252b3599b9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
winmm
midiOutReset
ws2_32
inet_ntoa
kernel32
GetVersion
GetVersionExA
VirtualQuery
LocalAlloc
LocalFree
GetModuleFileNameW
GetProcessAffinityMask
SetProcessAffinityMask
SetThreadAffinityMask
Sleep
ExitProcess
FreeLibrary
LoadLibraryA
GetModuleHandleA
GetProcAddress
user32
SetClipboardData
GetProcessWindowStation
GetProcessWindowStation
GetUserObjectInformationW
gdi32
LineTo
winspool.drv
OpenPrinterA
advapi32
RegQueryValueA
shell32
ShellExecuteA
ole32
OleInitialize
oleaut32
VariantCopyInd
comctl32
ImageList_Destroy
comdlg32
GetFileTitleA
wtsapi32
WTSSendMessageW
Sections
T-VMP Size: - Virtual size: 506KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
T-VMP Size: - Virtual size: 177KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
T-VMP Size: - Virtual size: 134KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
T-VMP Size: - Virtual size: 117KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
T-VMP Size: - Virtual size: 1.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
T-VMP Size: - Virtual size: 3.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
T-VMP Size: 5.7MB - Virtual size: 5.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
T-VMP Size: 104KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
T-VMP Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
T-VMP Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
T-VMP Size: 552KB - Virtual size: 550KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
T-VMP Size: 104KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ