Static task
static1
Behavioral task
behavioral1
Sample
87d7d3245043daf8653881ddeeda5a00.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
87d7d3245043daf8653881ddeeda5a00.exe
Resource
win10v2004-20231215-en
General
-
Target
87d7d3245043daf8653881ddeeda5a00
-
Size
224KB
-
MD5
87d7d3245043daf8653881ddeeda5a00
-
SHA1
46d5f236b4bfcb58a90d34cb244dc5ff8a38ad5b
-
SHA256
af4896f85c7053741c7d1f269cfec95c34a71012178a64d715fd7ab6c2f5bfbe
-
SHA512
5cf885218a1e0080aeb9e0a12b0d8c1d959d13c3c3f1c676085ef25286fce6d4c73a2d3f8956a1a77bedf67cd9ed3d11d1552e170eba5cacb5df35615851c102
-
SSDEEP
3072:AuZzCF0hbQR0k7JNo9js58AuTqidijFCzjDDq9Abn9sMGKmQz:AuY+hbQ0kFks+8idq+i69tJ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 87d7d3245043daf8653881ddeeda5a00
Files
-
87d7d3245043daf8653881ddeeda5a00.exe windows:1 windows x86 arch:x86
25c94c4eb4f43c2f5d21c9e24a39b57b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegDeleteKeyA
RegOpenKeyExA
RegCloseKey
RegCreateKeyExA
RegDeleteValueA
RegSetValueExA
RegEnumKeyExA
RegQueryInfoKeyA
RegEnumValueA
user32
SetForegroundWindow
wsprintfA
FindWindowA
WaitForInputIdle
CharPrevA
MessageBoxA
CharToOemA
EndDialog
SendDlgItemMessageA
CharNextA
UpdateWindow
ReleaseDC
GetDC
CreateWindowExA
RegisterClassA
LoadCursorA
LoadBitmapA
LoadIconA
SetCursor
CharUpperA
IsWindow
SetTimer
GetClassInfoA
KillTimer
PostMessageA
ScreenToClient
IsIconic
GetSystemMetrics
GetWindowRect
MoveWindow
wvsprintfA
MessageBeep
SetDlgItemTextA
GetDlgItem
SendMessageA
FillRect
PeekMessageA
TranslateMessage
DispatchMessageA
IsDialogMessageA
BeginPaint
GetClientRect
EndPaint
InvalidateRect
DefWindowProcA
DestroyWindow
UnregisterClassA
DialogBoxParamA
LoadStringA
ShowWindow
gdi32
SetTextColor
CreateFontIndirectA
BitBlt
CreateCompatibleDC
LineTo
GetDeviceCaps
GetClipBox
DeleteDC
SetBkColor
MoveToEx
CreatePen
SelectPalette
SelectObject
StretchDIBits
DeleteObject
CreatePalette
GetNearestPaletteIndex
CreateSolidBrush
RealizePalette
kernel32
GetShortPathNameA
GetProfileStringA
VirtualFree
GetFileType
GetStdHandle
GetCPInfo
GetOEMCP
GetACP
UnhandledExceptionFilter
RtlUnwind
GetProcAddress
WideCharToMultiByte
ExitProcess
GetCommandLineA
GetEnvironmentStrings
GetStartupInfoA
GetLogicalDrives
GetFullPathNameA
SetCurrentDirectoryA
GetCurrentDirectoryA
SetEnvironmentVariableA
GetLastError
lstrcmpiA
FindFirstFileA
DeleteFileA
FindNextFileA
FindClose
MultiByteToWideChar
GlobalUnlock
GlobalHandle
GlobalFree
GlobalAlloc
GlobalLock
FatalAppExitA
MulDiv
FindResourceA
LoadResource
LockResource
_lopen
_lclose
GetDriveTypeA
CreateProcessA
WinExec
GetVersion
VirtualAlloc
WaitForSingleObject
GetModuleHandleA
lstrcatA
GetVersionExA
lstrcpyA
GetModuleFileNameA
lstrcpynA
GetSystemInfo
GetWindowsDirectoryA
Sleep
lstrlenA
GlobalMemoryStatus
ole32
OleBuildVersion
OleUninitialize
CoGetClassObject
CoInitialize
CoUninitialize
OleInitialize
Sections
.text Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 9KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 100KB - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 4KB - Virtual size: 53B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 76KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ