Static task
static1
Behavioral task
behavioral1
Sample
770fa00ad1bdc1c9b2b00a4e0fd33d2681a54534b2edaaed7fe32d8d0c87af1d.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
770fa00ad1bdc1c9b2b00a4e0fd33d2681a54534b2edaaed7fe32d8d0c87af1d.exe
Resource
win10v2004-20231020-en
General
-
Target
770fa00ad1bdc1c9b2b00a4e0fd33d2681a54534b2edaaed7fe32d8d0c87af1d
-
Size
199KB
-
MD5
bfeac08fda3a7a34d3f124e1a3ee4b5f
-
SHA1
1e8725fa6656190e7e5c6a7bac8759bdbd319e08
-
SHA256
770fa00ad1bdc1c9b2b00a4e0fd33d2681a54534b2edaaed7fe32d8d0c87af1d
-
SHA512
aadf82915808c2b7b8133f812f05304f9b7a6b7085898165e83c1e8e554aa367f9ee2591ac27debc37d2b536c26d7b8684dea1eeba90d3d3f30bedfde8bdcbc8
-
SSDEEP
6144:Nz6ibfYrTbHWt/2AqFfdlsvjTBJgOQ2EPc:Nz5bfY7scZYTrnEPc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 770fa00ad1bdc1c9b2b00a4e0fd33d2681a54534b2edaaed7fe32d8d0c87af1d
Files
-
770fa00ad1bdc1c9b2b00a4e0fd33d2681a54534b2edaaed7fe32d8d0c87af1d.exe windows:5 windows x86
5552888b03f798eba260d08ec4ca604e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdiplus
GdipImageRotateFlip
GdipDrawImageRectRectI
GdipDeleteGraphics
GdipGetImageGraphicsContext
GdipCreateBitmapFromScan0
GdipBitmapSetPixel
GdipBitmapUnlockBits
GdipBitmapLockBits
GdipDisposeImage
GdipCloneImage
GdipAlloc
GdipFree
GdipCreateBitmapFromFile
GdipBitmapGetPixel
GdipGetImageHeight
GdipGetImageWidth
GdiplusStartup
mfc90u
ord5676
ord5674
ord3217
ord2087
ord4213
ord5830
ord6741
ord5548
ord1048
ord4179
ord6035
ord2206
ord2251
ord4747
ord6803
ord4173
ord6801
ord4423
ord4448
ord296
ord2702
ord280
ord265
ord811
ord2326
ord286
ord813
ord2447
ord1108
ord1137
ord2057
ord524
ord744
ord5182
ord404
ord663
ord5535
ord3187
ord5770
ord2537
ord6813
ord1552
ord1183
ord1383
ord2372
ord406
ord665
ord2490
ord2501
ord3018
ord579
ord781
ord5543
ord6835
ord1565
ord5793
ord799
ord3515
ord1599
ord3220
ord285
ord1607
ord4405
ord6013
ord4490
ord5979
ord2479
ord2478
ord938
ord935
ord2695
ord2572
ord6604
ord2904
ord4347
ord4996
ord5680
ord5663
ord6018
ord3115
ord4905
ord4681
ord3670
ord600
ord6482
ord1098
ord4211
ord794
ord589
ord4043
ord4967
ord5632
ord4631
ord5324
ord5008
ord2208
ord1810
ord1809
ord1675
ord3353
ord6408
ord1754
ord1751
ord4345
ord1492
ord4664
ord5602
ord2074
ord5512
ord6800
ord4603
ord5653
ord3743
ord5154
ord4702
ord1728
ord6466
ord5685
ord5683
ord960
ord965
ord969
ord967
ord971
ord2615
ord2635
ord2619
ord2625
ord2623
ord2621
ord2638
ord2633
ord2617
ord2640
ord2628
ord2610
ord2612
ord2630
ord2375
ord2368
ord1641
ord6802
ord4174
ord6804
ord3682
ord5404
ord6376
ord3226
ord1442
ord5625
ord2139
ord1792
ord1791
ord1727
ord5650
ord2771
ord2983
ord3112
ord4728
ord2966
ord3140
ord2774
ord2893
ord2764
ord4080
ord4081
ord4071
ord2891
ord4348
ord4910
ord4682
ord5167
ord6760
ord4000
ord1937
ord1934
ord639
ord1272
ord374
ord3794
ord801
msvcr90
free
malloc
fflush
ferror
memset
memcpy
__CxxFrameHandler3
sscanf
getenv
tmpfile
strncpy
fread
fseek
_amsg_exit
__wgetmainargs
_cexit
_exit
_XcptFilter
_wcmdln
_initterm
exit
fprintf
__iob_func
sprintf
??0exception@std@@QAE@XZ
??0exception@std@@QAE@ABQBD@Z
?what@exception@std@@UBEPBDXZ
??0exception@std@@QAE@ABV01@@Z
??1exception@std@@UAE@XZ
_invalid_parameter_noinfo
swscanf
strstr
_wmkdir
_wtoi
_CxxThrowException
_wsplitpath
wcscpy_s
fclose
_wfopen
fwrite
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_crt_debugger_hook
_controlfp_s
_invoke_watson
_except_handler4_common
?terminate@@YAXXZ
_decode_pointer
_onexit
_lock
__dllonexit
_unlock
__set_app_type
_encode_pointer
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
memmove_s
kernel32
GetModuleFileNameW
DeleteFileW
CopyFileW
InterlockedExchange
InterlockedCompareExchange
GetStartupInfoW
SetUnhandledExceptionFilter
QueryPerformanceCounter
GetTempFileNameW
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
IsDebuggerPresent
GetTempPathW
GetTickCount
Sleep
user32
GetClientRect
GetSystemMetrics
DrawIcon
SendMessageW
LoadIconW
IsIconic
EnableWindow
shell32
ShellExecuteW
SHGetPathFromIDListW
SHBrowseForFolderW
SHFileOperationW
SHGetFolderPathW
comctl32
InitCommonControlsEx
shlwapi
PathFileExistsW
msvcp90
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
Sections
.text Size: 130KB - Virtual size: 129KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ