Static task
static1
Behavioral task
behavioral1
Sample
769c804b823f2cc7820cc0dbc238ddafe475e4d1b6bfe08dfe2b4c54fb8a5005.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
769c804b823f2cc7820cc0dbc238ddafe475e4d1b6bfe08dfe2b4c54fb8a5005.exe
Resource
win10v2004-20230915-en
General
-
Target
769c804b823f2cc7820cc0dbc238ddafe475e4d1b6bfe08dfe2b4c54fb8a5005
-
Size
447KB
-
MD5
77faf14c23598bec0f2f53cc8d831ab3
-
SHA1
424d90b5553f80aed3ae01b2dd83b3e5d04ca58b
-
SHA256
769c804b823f2cc7820cc0dbc238ddafe475e4d1b6bfe08dfe2b4c54fb8a5005
-
SHA512
ffd54ce4860f5874720d845802e532920d69ead6cd2aa1553ce44fc031491c837b43a61226183ee97ec0319aa06f3cb9169900ad410e9e211482ece82714ce56
-
SSDEEP
6144:EIjA+zG4jLro0EZcPJ5ZmfzNgAgFeKTUUfuxI+x7bdbR9piK:EItf75ZyzNg7EtUGXx7b
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 769c804b823f2cc7820cc0dbc238ddafe475e4d1b6bfe08dfe2b4c54fb8a5005
Files
-
769c804b823f2cc7820cc0dbc238ddafe475e4d1b6bfe08dfe2b4c54fb8a5005.exe windows:5 windows x86
d17061b4cac45e440d4a5017c477acdf
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetOEMCP
HeapFree
TerminateProcess
UnhandledExceptionFilter
IsDebuggerPresent
Sleep
ExitProcess
GetCommandLineA
GetStartupInfoA
GetSystemTimeAsFileTime
GetFullPathNameW
HeapAlloc
RtlUnwind
RaiseException
VirtualAlloc
HeapReAlloc
HeapSize
HeapCreate
HeapDestroy
VirtualFree
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetACP
IsValidCodePage
GetCPInfo
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetTimeZoneInformation
GetTimeFormatA
GetDateFormatA
GetConsoleCP
GetConsoleMode
GetLocaleInfoW
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetDriveTypeA
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CompareStringW
SetEnvironmentVariableA
GetProcessHeap
GetCurrentDirectoryA
GlobalFindAtomA
lstrcmpW
GetVersionExA
GlobalDeleteAtom
GetLocaleInfoA
InterlockedExchange
GlobalFlags
GlobalAddAtomA
CreateFileA
CloseHandle
FlushFileBuffers
SetFilePointer
WriteFile
lstrcmpA
GlobalGetAtomNameA
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
GetModuleFileNameA
InterlockedDecrement
InterlockedIncrement
GetModuleHandleA
GetModuleHandleW
CompareStringA
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
WideCharToMultiByte
DeleteFileW
GetCurrentProcess
GetCurrentProcessId
CreateDirectoryW
SetUnhandledExceptionFilter
FindClose
FindNextFileW
FindFirstFileW
lstrcpyW
SetLastError
GetCurrentThreadId
CreateFileW
InterlockedCompareExchange
GetModuleFileNameW
LocalAlloc
LocalFree
FindResourceExA
FindResourceA
LoadResource
LockResource
SizeofResource
GetLastError
lstrlenA
LoadLibraryA
MultiByteToWideChar
GetProcAddress
FreeEnvironmentStringsA
FreeLibrary
user32
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetMenu
GetClientRect
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
CopyRect
DefWindowProcA
CallWindowProcA
GetMenu
SystemParametersInfoA
GetWindowPlacement
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
EnableMenuItem
CheckMenuItem
PostQuitMessage
SetForegroundWindow
IsIconic
PostMessageA
SetWindowPos
SetWindowLongA
IsWindow
GetTopWindow
SetWindowsHookExA
CallNextHookEx
DispatchMessageA
GetKeyState
PeekMessageA
ValidateRect
GetFocus
ClientToScreen
GetWindow
GetDlgCtrlID
GetWindowRect
GetClassNameA
PtInRect
SetWindowTextA
GetWindowTextA
GetWindowThreadProcessId
wsprintfW
SendMessageA
GetParent
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
EnableWindow
MessageBoxA
UnhookWindowsHookEx
LoadCursorA
GetSystemMetrics
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
DestroyMenu
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
RegisterWindowMessageA
LoadIconA
WinHelpA
GetCapture
GetClassLongA
SetPropA
GetPropA
RemovePropA
GetForegroundWindow
GetDlgItem
CreateWindowExA
gdi32
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
GetStockObject
SetMapMode
RestoreDC
SaveDC
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
DeleteObject
GetDeviceCaps
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
oleaut32
VariantChangeType
VariantClear
SystemTimeToVariantTime
VarUdateFromDate
VariantTimeToSystemTime
VariantInit
oleacc
CreateStdAccessibleObject
LresultFromObject
dbghelp
MiniDumpWriteDump
Sections
.text Size: 276KB - Virtual size: 276KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 63KB - Virtual size: 62KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 48KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 42KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ