Static task
static1
Behavioral task
behavioral1
Sample
85ef7e42a1a2458887d8a6f039c804e8.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
85ef7e42a1a2458887d8a6f039c804e8.exe
Resource
win10v2004-20231215-en
General
-
Target
85ef7e42a1a2458887d8a6f039c804e8
-
Size
252KB
-
MD5
85ef7e42a1a2458887d8a6f039c804e8
-
SHA1
3d5c28d91ef1c46298d6e292b40779578df527f1
-
SHA256
51eab676b5666cbdfafa8fc4b58d38c3dd39e98c510532572a5c4710479e4424
-
SHA512
e76455509d6c991c410e70fa41dc7255d087bf24fb76b499370ef319d060673ee841c1333ebc609b2e0d9740686dc1b83a42b005f482cb40ec6e713f53b3d425
-
SSDEEP
6144:iVP+fE1aa7qMbuhl7ecWq/JCYp0eBFp6MR6Ho:iVuROqDZe6vp7FEs
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 85ef7e42a1a2458887d8a6f039c804e8
Files
-
85ef7e42a1a2458887d8a6f039c804e8.exe windows:4 windows x86 arch:x86
2168924e42703f48f13006228d84cfc2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LockResource
LoadResource
SizeofResource
FreeResource
FindResourceA
lstrcatA
lstrlenA
CreateFileA
RtlMoveMemory
ReadFile
WriteFile
SetFilePointer
SetFileTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
GlobalAlloc
GlobalFree
SetFileAttributesA
DeleteFileA
GetCurrentProcess
GetTempFileNameA
GetWindowsDirectoryA
GetDriveTypeA
GetModuleFileNameA
GetTempPathA
lstrcpynA
GetDiskFreeSpaceA
GetCurrentDirectoryA
CreateProcessA
GetPrivateProfileStringA
GetPrivateProfileIntA
FindClose
FindNextFileA
FindFirstFileA
_lclose
_llseek
_lopen
WaitForSingleObject
GetExitCodeProcess
CloseHandle
lstrcpyA
lstrcmpiA
LoadLibraryA
GetProcAddress
FreeLibrary
GetLastError
FormatMessageA
LocalAlloc
lstrcmpA
LocalFree
GetVersionExA
CreateThread
TerminateThread
FlushFileBuffers
SetCurrentDirectoryA
GetFileAttributesA
CreateDirectoryA
RemoveDirectoryA
WideCharToMultiByte
GetStringTypeA
SetStdHandle
HeapAlloc
HeapFree
HeapCreate
TlsGetValue
SetLastError
TlsAlloc
TlsSetValue
GetCurrentThreadId
GetStdHandle
GetFileType
SetHandleCount
GetOEMCP
GetACP
GetCPInfo
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
RtlUnwind
LCMapStringW
LCMapStringA
ExitProcess
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
LeaveCriticalSection
GetStringTypeW
MultiByteToWideChar
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
user32
DialogBoxParamA
SetWindowLongA
GetWindowLongA
CallWindowProcA
EndDialog
GetDlgItem
SetForegroundWindow
SetWindowTextA
SetDlgItemTextA
GetDesktopWindow
SendDlgItemMessageA
LoadStringA
GetDlgItemTextA
EnableWindow
MsgWaitForMultipleObjects
PeekMessageA
SetWindowPos
ReleaseDC
GetDC
GetWindowRect
CharPrevA
ExitWindowsEx
wsprintfA
CharNextA
ShowWindow
MessageBeep
MessageBoxA
DispatchMessageA
SendMessageA
gdi32
GetDeviceCaps
advapi32
RegDeleteValueA
FreeSid
EqualSid
AllocateAndInitializeSid
GetTokenInformation
OpenProcessToken
AdjustTokenPrivileges
LookupPrivilegeValueA
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
RegSetValueExA
RegQueryValueExA
RegOpenKeyA
RegQueryInfoKeyA
comctl32
ord17
Sections
.text Size: 56KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 213B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 100KB - Virtual size: 125KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 84KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ