Static task
static1
Behavioral task
behavioral1
Sample
0703d583aeb747ff1420c12baedda689.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0703d583aeb747ff1420c12baedda689.exe
Resource
win10v2004-20231215-en
General
-
Target
0703d583aeb747ff1420c12baedda689
-
Size
220KB
-
MD5
0703d583aeb747ff1420c12baedda689
-
SHA1
bfcf566e3f9b86b7f3a49acdc58bc4673280bcc3
-
SHA256
e11724a88a4a2a08dbab599a9e03791ba01a5437f92a6cb954314b9fb88afafd
-
SHA512
ee556d3571931ebad6fa76a8bf6b21bb5dc1bb273261f5a03f47d04a2033dcb845056b3b0c63fb4e8c379d8f1f7ddca0c47a869584b7f8503e005984de560158
-
SSDEEP
6144:FEaw0CjHJ6Gqn+ipxmHZo1DxX6S/31R1OHY++yR:qcuJ6p9NX6S/lRs5+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0703d583aeb747ff1420c12baedda689
Files
-
0703d583aeb747ff1420c12baedda689.exe windows:4 windows x86 arch:x86
41aa219c3beabe794ba3d1d5f3821bdb
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
Thread32First
ReleaseSemaphore
ShowConsoleCursor
DeleteFileA
GetLocaleInfoA
SetConsoleMenuClose
IsValidCodePage
FindNextVolumeMountPointW
UnhandledExceptionFilter
OutputDebugStringA
SetFileValidData
SetFileAttributesA
GetConsoleCursorInfo
WriteConsoleOutputA
_lwrite
GetTickCount
GetCurrentProcess
DuplicateConsoleHandle
ReadConsoleOutputCharacterA
QueryInformationJobObject
SetHandleContext
PulseEvent
LZCloseFile
MulDiv
SetVolumeLabelA
GetVersionExA
SearchPathA
LoadResource
DeleteTimerQueueEx
GetProcessShutdownParameters
GlobalGetAtomNameA
LocalHandle
GetWindowsDirectoryA
OpenJobObjectA
SetConsoleInputExeNameA
GetDriveTypeA
HeapLock
SearchPathW
GetVolumePathNameA
GetDllDirectoryA
OpenWaitableTimerA
GetThreadSelectorEntry
_hwrite
GetCommMask
FindFirstChangeNotificationA
GetSystemDefaultLangID
GetExpandedNameA
VirtualAllocEx
SetThreadUILanguage
VirtualAlloc
GetCurrentConsoleFont
MoveFileWithProgressA
GetSystemInfo
GetTickCount
SystemTimeToFileTime
UpdateResourceA
ReadConsoleOutputCharacterA
winmm
timeBeginPeriod
user32
SetWindowPos
EnumThreadWindows
GetDoubleClickTime
LoadBitmapA
EnumWindowStationsA
EnumDisplaySettingsExW
DestroyMenu
GetWindowInfo
PeekMessageA
GetGuiResources
CopyRect
RemoveMenu
SetProgmanWindow
SendInput
SetMenuItemInfoA
GetWindowRect
BroadcastSystemMessageExA
GetWindowTextA
SendNotifyMessageA
IsCharAlphaNumericA
UnpackDDElParam
CreateMenu
SetWindowStationUser
SetWindowPos
IsDlgButtonChecked
ChangeDisplaySettingsExA
DialogBoxParamA
TranslateAccelerator
UpdateLayeredWindow
DialogBoxParamA
MonitorFromPoint
FindWindowExW
GetMessageTime
MapVirtualKeyExW
ShowScrollBar
GetKeyboardLayout
GetRegisteredRawInputDevices
GetUserObjectInformationA
UpdateLayeredWindow
GetForegroundWindow
BroadcastSystemMessageExA
RegisterTasklist
UnregisterUserApiHook
SetMenuItemInfoA
GetClipCursor
UnregisterDeviceNotification
CalcMenuBar
CharPrevExA
GetKeyboardLayoutNameA
OpenWindowStationA
FindWindowExA
TranslateMessageEx
LoadMenuIndirectA
GetCursor
CountClipboardFormats
GetRawInputDeviceList
GetMessageTime
CreateDialogIndirectParamA
ShowCaret
IsWindowInDestroy
Sections
.idata Size: - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.itext Size: 208KB - Virtual size: 205KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ