Static task
static1
Behavioral task
behavioral1
Sample
07cbb4f80e396a9c293bc3757f7b7930b91cc38ea2d1b46ce10b142dfbddd808.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
07cbb4f80e396a9c293bc3757f7b7930b91cc38ea2d1b46ce10b142dfbddd808.exe
Resource
win10v2004-20231215-en
General
-
Target
07cbb4f80e396a9c293bc3757f7b7930b91cc38ea2d1b46ce10b142dfbddd808
-
Size
1.1MB
-
MD5
3dd87ff5a28b0aec90a697e990052b4d
-
SHA1
bfb816b1388c4f7cbdc14f00ef94fa5b16206351
-
SHA256
07cbb4f80e396a9c293bc3757f7b7930b91cc38ea2d1b46ce10b142dfbddd808
-
SHA512
c896a69d473b980d52924c7939b111bb6aa5974ed00d819bf36deb947d457deb1fbacea9cf7dd58204085be4b21be128fda4343946e981b913a2e94fbf824f01
-
SSDEEP
12288:9C6ozb9fWNGA30hngGE+WN5MWCrRYCA9sn:Y/U8ngG54MWCrRyin
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 07cbb4f80e396a9c293bc3757f7b7930b91cc38ea2d1b46ce10b142dfbddd808
Files
-
07cbb4f80e396a9c293bc3757f7b7930b91cc38ea2d1b46ce10b142dfbddd808.exe windows:4 windows x64 arch:x64
c1ff4652f70fdcc388646a104637917c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
advapi32
AdjustTokenPrivileges
GetUserNameW
ImpersonateLoggedOnUser
LookupPrivilegeValueW
OpenProcessToken
RegCloseKey
RegCreateKeyExW
RegOpenKeyExW
RegQueryValueExW
RegSetValueExW
RevertToSelf
comctl32
InitCommonControls
CreateStatusWindowW
ImageList_Create
ImageList_Remove
ImageList_ReplaceIcon
gdi32
BitBlt
CreateCompatibleBitmap
CreateCompatibleDC
CreatePen
CreateSolidBrush
DeleteDC
DeleteObject
ExcludeClipRect
ExtTextOutW
LineTo
MoveToEx
RestoreDC
SaveDC
SelectObject
SetBkColor
SetPixel
SetTextColor
kernel32
CloseHandle
CreateEventW
CreateProcessW
CreateThread
EnterCriticalSection
FormatMessageW
GetCommandLineA
GetModuleHandleA
GetModuleHandleW
GetPriorityClass
GetProcAddress
GetProcessAffinityMask
GetProcessIoCounters
GetStartupInfoA
GetSystemInfo
GetVersionExW
HeapAlloc
HeapFree
InitializeCriticalSection
IsWow64Process
LeaveCriticalSection
LocalFree
MultiByteToWideChar
OpenProcess
ReadProcessMemory
ResetEvent
SetEvent
SetPriorityClass
SetProcessAffinityMask
TerminateProcess
WaitForSingleObject
WriteProcessMemory
lstrcmpW
ntdll
NtQueryInformationProcess
NtQuerySystemInformation
shell32
ShellAboutW
Shell_NotifyIconW
shlwapi
StrFormatByteSizeW
StrFormatKBSizeW
ucrtbase
__acrt_iob_func
__p___argc
__p___argv
__stdio_common_vfprintf
__stdio_common_vswprintf
_configure_narrow_argv
_get_initial_narrow_environment
_initialize_narrow_environment
_set_app_type
_ui64tow
exit
log10
memcpy
strcmp
toupper
wcscat
wcsstr
user32
AppendMenuW
BeginPaint
BringWindowToTop
CallWindowProcW
CascadeWindows
CheckMenuItem
CheckMenuRadioItem
CopyRect
CreateDialogParamW
CreateIconIndirect
CreatePopupMenu
DefWindowProcW
DeleteMenu
DestroyIcon
DestroyMenu
DialogBoxParamW
DrawMenuBar
DrawTextW
EnableMenuItem
EnableWindow
EndDialog
EndPaint
EnumWindows
FillRect
GetClassLongPtrW
GetClientRect
GetCursorPos
GetDC
GetDlgItem
GetGuiResources
GetMenu
GetMenuItemCount
GetMenuState
GetParent
GetSubMenu
GetSysColor
GetSystemMetrics
GetWindow
GetWindowLongPtrW
GetWindowLongW
GetWindowPlacement
GetWindowRect
GetWindowTextW
GetWindowThreadProcessId
InsertMenuW
InvalidateRect
IsHungAppWindow
IsIconic
IsWindow
IsWindowVisible
IsZoomed
KillTimer
LoadBitmapW
LoadIconW
LoadImageA
LoadImageW
LoadMenuW
LoadStringA
LoadStringW
MapWindowPoints
MessageBoxW
MoveWindow
OpenIcon
PostMessageW
ReleaseDC
RemoveMenu
SendMessageA
SendMessageTimeoutW
SendMessageW
SetFocus
SetForegroundWindow
SetMenuDefaultItem
SetTimer
SetWindowLongPtrW
SetWindowLongW
SetWindowPos
SetWindowTextW
ShowWindow
SwitchToThisWindow
TileWindows
TrackPopupMenu
TrackPopupMenuEx
WinHelpW
wsprintfW
Sections
.text Size: 56KB - Virtual size: 54KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 80B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 18KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 612KB - Virtual size: 608KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
/4 Size: 4KB - Virtual size: 1008B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/19 Size: 184KB - Virtual size: 180KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/31 Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/45 Size: 36KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/57 Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/70 Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/81 Size: 72KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/92 Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ