Static task
static1
Behavioral task
behavioral1
Sample
72cd3a14860d821a73f05b702050bde457942563e46de55964e8dfc1a2ae4ec1.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
72cd3a14860d821a73f05b702050bde457942563e46de55964e8dfc1a2ae4ec1.exe
Resource
win10v2004-20231023-en
General
-
Target
72cd3a14860d821a73f05b702050bde457942563e46de55964e8dfc1a2ae4ec1
-
Size
868KB
-
MD5
02b01d2aa98f2e9e08e0ce4081d6bec7
-
SHA1
b60403e8adf1b076be504643b680f3eb6cbaa949
-
SHA256
72cd3a14860d821a73f05b702050bde457942563e46de55964e8dfc1a2ae4ec1
-
SHA512
6fc3ebb34dd5d471c048a5692d01376c651cd3b55d7b2124923a6563b8a8797716d5e4e29f0bb0ede1bf1d8cc1389e20d55fd8048b6ae4d94e9b62df350b6053
-
SSDEEP
12288:cT8UCNLNCYAXYpkBsxbXnlkmHrnRlyOT5m56ZeCx:cTccAkWxbXfrnA56ZeCx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 72cd3a14860d821a73f05b702050bde457942563e46de55964e8dfc1a2ae4ec1
Files
-
72cd3a14860d821a73f05b702050bde457942563e46de55964e8dfc1a2ae4ec1.exe windows:4 windows x64 arch:x64
b71bbf20b089859fafb9787d282a3913
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
advapi32
RegCloseKey
RegCreateKeyExW
RegOpenKeyExW
RegQueryValueExW
RegQueryValueW
RegSetValueExW
comctl32
CreateStatusWindowW
CreateToolbarEx
ImageList_Destroy
ImageList_DrawEx
ImageList_LoadImageW
InitCommonControlsEx
comdlg32
ChooseFontW
CommDlgExtendedError
gdi32
CreateFontIndirectW
CreateFontW
CreateRectRgn
CreateRectRgnIndirect
CreateSolidBrush
DeleteObject
ExtSelectClipRgn
GetClipRgn
GetDeviceCaps
GetObjectW
GetStockObject
GetTextExtentPoint32W
LineTo
MoveToEx
Rectangle
SelectClipRgn
SelectObject
SetBkMode
SetTextColor
kernel32
CloseHandle
CompareFileTime
CreateFileW
FileTimeToLocalFileTime
FileTimeToSystemTime
FindClose
FindFirstFileW
FindNextFileW
FormatMessageW
GetCommandLineW
GetCurrentDirectoryW
GetDateFormatW
GetDiskFreeSpaceExW
GetDriveTypeW
GetFileAttributesExW
GetFileAttributesW
GetFileInformationByHandle
GetLogicalDriveStringsW
GetModuleHandleW
GetNumberFormatW
GetProcAddress
GetStartupInfoW
GetTimeFormatW
GetVolumeInformationW
GlobalFree
GlobalLock
GlobalUnlock
HeapAlloc
HeapFree
LocalFree
MulDiv
MultiByteToWideChar
SetCurrentDirectoryW
SetErrorMode
lstrcmpW
lstrcmpiW
mpr
WNetConnectionDialog
WNetDisconnectDialog
WNetGetLastErrorW
ole32
CoGetMalloc
CoInitialize
CoUninitialize
shell32
ord18
ord25
ExtractIconExW
SHBindToParent
SHFileOperationW
SHGetDataFromIDListW
SHGetDesktopFolder
ShellAboutW
ShellExecuteExW
ShellExecuteW
shlwapi
StrFormatByteSizeW
ucrtbase
__p___argc
__p___wargv
__stdio_common_vswprintf
_assert
_configure_wide_argv
_get_initial_wide_environment
_initialize_wide_environment
_set_app_type
_wsplitpath
exit
memcmp
memcpy
memmove
qsort
setlocale
tolower
wcsrchr
user32
BeginDeferWindowPos
BeginPaint
CallNextHookEx
CallWindowProcW
CharUpperW
CheckMenuItem
CreatePopupMenu
CreateWindowExW
DefFrameProcW
DefMDIChildProcW
DeferWindowPos
DestroyIcon
DestroyWindow
DialogBoxParamW
DispatchMessageW
DrawIconEx
DrawTextW
EndDeferWindowPos
EndDialog
EndPaint
FillRect
GetCapture
GetClientRect
GetCursorPos
GetDC
GetDlgItem
GetFocus
GetKeyState
GetMenuItemCount
GetMessageW
GetParent
GetScrollPos
GetSubMenu
GetSystemMetrics
GetWindow
GetWindowInfo
GetWindowLongPtrW
GetWindowPlacement
GetWindowRect
GetWindowTextW
InvalidateRect
IsIconic
IsWindowVisible
IsZoomed
LoadAcceleratorsW
LoadCursorW
LoadIconW
LoadImageW
LoadMenuW
LoadStringW
MapWindowPoints
MessageBoxW
MoveWindow
PostQuitMessage
RedrawWindow
RegisterClassExW
RegisterClassW
RegisterClipboardFormatW
ReleaseCapture
ReleaseDC
ScreenToClient
ScrollWindowEx
SendMessageW
SetCapture
SetCursor
SetDlgItemTextW
SetFocus
SetWindowLongPtrW
SetWindowPlacement
SetWindowTextW
SetWindowsHookExW
ShowWindow
TrackPopupMenu
TranslateAcceleratorW
TranslateMDISysAccel
TranslateMessage
UnhookWindowsHookEx
UpdateWindow
WinHelpW
wsprintfW
version
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
Sections
.text Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 128B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 44KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pdata Size: 4KB - Virtual size: 732B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xdata Size: 4KB - Virtual size: 1008B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 3KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 224KB - Virtual size: 222KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 68B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/4 Size: 4KB - Virtual size: 224B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/19 Size: 200KB - Virtual size: 198KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/31 Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/45 Size: 28KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/57 Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/70 Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/81 Size: 72KB - Virtual size: 71KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/92 Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/106 Size: 4KB - Virtual size: 140B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ