Static task
static1
Behavioral task
behavioral1
Sample
c83de73e3ce7f95860618a469cc1a7dd830a36de565718867110398d004440b6.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
c83de73e3ce7f95860618a469cc1a7dd830a36de565718867110398d004440b6.exe
Resource
win10v2004-20231023-en
General
-
Target
c83de73e3ce7f95860618a469cc1a7dd830a36de565718867110398d004440b6
-
Size
247KB
-
MD5
a85e12c067c858a66b236ef8324213b7
-
SHA1
3373860ab52fd81290ed6554932f2dd33c315709
-
SHA256
c83de73e3ce7f95860618a469cc1a7dd830a36de565718867110398d004440b6
-
SHA512
285beb2a0d7478eb0a993f842f4de496c170b67d44e2299527a9f819d5f5b4eb97bfb14a73207a1e03c81d328e97bdeb05274e712d737845b7c70e59e45bfd15
-
SSDEEP
6144:30z8sq37nV0My5fMdlEHqmJyO0NKav0yQqfe8:3vs6nVhyaLEKoONKc0yQo
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c83de73e3ce7f95860618a469cc1a7dd830a36de565718867110398d004440b6
Files
-
c83de73e3ce7f95860618a469cc1a7dd830a36de565718867110398d004440b6.exe windows:5 windows x86
87d239a4723aad714ef37ec160350014
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
CreateMutexW
DeleteCriticalSection
EnterCriticalSection
ExpandEnvironmentStringsW
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetFileAttributesW
GetLastError
GetLocaleInfoW
GetModuleFileNameW
GetModuleHandleA
GetPrivateProfileIntW
GetPrivateProfileSectionNamesW
GetPrivateProfileStringW
GetProcAddress
GetProcessHeap
GetStartupInfoW
GetSystemInfo
GetSystemTimeAsFileTime
GetTickCount
GetWindowsDirectoryW
HeapAlloc
HeapFree
HeapReAlloc
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryW
QueryPerformanceCounter
SetCurrentDirectoryW
SetUnhandledExceptionFilter
Sleep
TerminateProcess
TlsGetValue
UnhandledExceptionFilter
VirtualProtect
VirtualQuery
msvcrt
__dllonexit
__lconv_init
__set_app_type
__setusermatherr
__wgetmainargs
__winitenv
_amsg_exit
_cexit
_fmode
_fpreset
_initterm
_iob
_lock
_onexit
_unlock
_vsnwprintf
_wcmdln
_wcsicmp
_wcsnicmp
abort
calloc
exit
fprintf
free
fwrite
malloc
memmove
signal
strncmp
vfprintf
wcschr
wcslen
wcsrchr
wcstoul
shell32
ShellExecuteW
gdi32
BitBlt
CreateCompatibleDC
CreateFontIndirectW
CreatePen
CreateSolidBrush
DeleteDC
DeleteObject
GetObjectW
GetStockObject
LineTo
MoveToEx
PatBlt
SelectObject
SetBkMode
SetTextColor
user32
AdjustWindowRect
BeginPaint
CallWindowProcW
CreateWindowExW
DefWindowProcW
DestroyWindow
DispatchMessageW
DrawTextW
EndPaint
FindWindowW
GetDlgCtrlID
GetFocus
GetForegroundWindow
GetMessageW
GetParent
GetSysColor
GetSystemMenu
GetSystemMetrics
GetWindowDC
GetWindowLongW
GetWindowTextW
InflateRect
InvalidateRect
IsDialogMessageW
IsWindowEnabled
LoadBitmapW
LoadCursorW
LoadIconW
LoadStringW
MessageBoxW
OffsetRect
PostQuitMessage
RegisterClassExW
ReleaseDC
RemoveMenu
SendMessageW
SetFocus
SetForegroundWindow
SetWindowLongW
ShowWindow
TranslateMessage
UpdateWindow
Sections
.text Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 128B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
/4 Size: 512B - Virtual size: 20B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 3KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 52B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 182KB - Virtual size: 182KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rossym Size: 36KB - Virtual size: 36KB
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ