Static task
static1
Behavioral task
behavioral1
Sample
d5404772e731635787ebf5d92c81b73ccd2af46a968e6c9012321a7552962628.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
d5404772e731635787ebf5d92c81b73ccd2af46a968e6c9012321a7552962628.exe
Resource
win10v2004-20231023-en
General
-
Target
d5404772e731635787ebf5d92c81b73ccd2af46a968e6c9012321a7552962628
-
Size
100KB
-
MD5
1dc482fba97997342ca634fa4e10f360
-
SHA1
e91a46190f19bee1d3b8e3f024856293d1a8ec73
-
SHA256
d5404772e731635787ebf5d92c81b73ccd2af46a968e6c9012321a7552962628
-
SHA512
f97977b996e35b67bfc228d27f25c29bde8588a52daca53d4249646949ea2f27b138e1bf9ede92199791c06e450b9033b1e5723f052c7e10b0adcdabd01eb872
-
SSDEEP
1536:JDcB+VWn0XIq2/l4SthiZ7lNVztLQlg41O+P0w2Tf0wBOqAD:NSkjVztx44iz2bzBOqAD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d5404772e731635787ebf5d92c81b73ccd2af46a968e6c9012321a7552962628
Files
-
d5404772e731635787ebf5d92c81b73ccd2af46a968e6c9012321a7552962628.exe windows:4 windows x86 arch:x86
176aab679a585681161e4adf7648cca2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mfc80
ord5583
ord2018
ord2063
ord4326
ord6276
ord3801
ord6278
ord4014
ord4038
ord757
ord876
ord605
ord762
ord578
ord781
ord4109
ord2272
ord304
ord2020
ord1054
ord265
ord354
ord3182
ord4262
ord4486
ord2862
ord5200
ord1599
ord1655
ord1656
ord1964
ord5175
ord1362
ord4967
ord3345
ord6277
ord3802
ord6279
ord1522
ord2172
ord2178
ord2405
ord2387
ord2385
ord2403
ord2415
ord2392
ord2408
ord2413
ord2396
ord3806
ord2400
ord2394
ord2410
ord2390
ord934
ord930
ord932
ord928
ord923
ord5233
ord5235
ord5960
ord1600
ord4282
ord4722
ord3403
ord5203
ord4185
ord6275
ord5073
ord1908
ord5152
ord4244
ord1401
ord3946
ord1617
ord1620
ord5912
ord6724
ord1551
ord1670
ord1671
ord4580
ord4890
ord4735
ord4212
ord5182
ord3641
ord1084
ord2371
ord2367
ord1903
ord1063
ord3934
ord4035
ord310
ord4749
ord709
ord501
ord764
ord1010
ord5102
ord6219
ord5382
ord3832
ord1920
ord2931
ord5224
ord5226
ord2248
ord3948
ord4568
ord5230
ord5213
ord5566
ord2537
ord2731
ord2835
ord4307
ord2714
ord2838
ord2540
ord2646
ord2533
ord3718
ord3719
ord3709
ord2644
ord3949
ord4481
ord4261
ord3333
ord566
ord4541
ord3683
ord2398
msvcr80
_XcptFilter
_exit
_cexit
__getmainargs
_amsg_exit
_decode_pointer
_onexit
_lock
__dllonexit
_encode_pointer
_unlock
_except_handler4_common
_CIsin
_CIcos
sscanf
_ismbblead
_CxxThrowException
_invalid_parameter_noinfo
qsort
bsearch
realloc
memset
memcpy
??0exception@std@@QAE@XZ
??1exception@std@@UAE@XZ
?what@exception@std@@UBEPBDXZ
??0exception@std@@QAE@ABQBD@Z
__CxxFrameHandler3
free
exit
_acmdln
malloc
_initterm
_initterm_e
_controlfp_s
_invoke_watson
_crt_debugger_hook
?_type_info_dtor_internal_method@type_info@@QAEXXZ
?terminate@@YAXXZ
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
??0exception@std@@QAE@ABV01@@Z
_configthreadlocale
kernel32
IsBadReadPtr
LoadLibraryA
FreeLibrary
GetProcessHeap
Sleep
InterlockedCompareExchange
GetStartupInfoA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
GetProcAddress
GetVersionExA
GetACP
GetLocaleInfoA
GetThreadLocale
InterlockedExchange
user32
IsIconic
GetDC
EnableWindow
GetSystemMenu
GetSystemMetrics
AppendMenuA
DrawIcon
LoadIconA
SendMessageA
LoadAcceleratorsA
GetMessageA
TranslateAcceleratorA
TranslateMessage
DispatchMessageA
RegisterClassExA
DefWindowProcA
DestroyWindow
BeginPaint
GetClientRect
DrawTextA
EndPaint
PostQuitMessage
CreateWindowExA
UpdateWindow
ShowWindow
gdi32
SetPixel
msvcp80
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@ABV01@@Z
??$?HDU?$char_traits@D@std@@V?$allocator@D@1@@std@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@0@Z
?replace@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@IIPBD@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
??Y?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@D@Z
?swap@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEXAAV12@@Z
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
?substr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV12@II@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
Sections
.text Size: 72KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ