Static task
static1
Behavioral task
behavioral1
Sample
03beef6f68a878ba9a5542764c589821.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
03beef6f68a878ba9a5542764c589821.exe
Resource
win10v2004-20231222-en
General
-
Target
03beef6f68a878ba9a5542764c589821
-
Size
142KB
-
MD5
03beef6f68a878ba9a5542764c589821
-
SHA1
c90df30a64599e2eba01267b6c0232f4dcd65068
-
SHA256
ec2716bdf53a72c803bd8ae26b89c372e345b716074434c6080585ec9ff7babc
-
SHA512
33f7176643623de3c3223817d6958dcb4fed48201c88840ade075fb3081cbe5d48812748a326d3e8d9b14d72cafda593a03d7e1254643b20f859967de218c054
-
SSDEEP
3072:Zy8Nob1sneT6p7sGYMS2CKXpp/uxT/5sRBgOq2xo0LkoK:Da1qeT6p7ZlMT/5s0Oq2PL2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 03beef6f68a878ba9a5542764c589821
Files
-
03beef6f68a878ba9a5542764c589821.exe windows:5 windows x86 arch:x86
077ce9c2a38e49524ab38b6cb6f2dd5b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetStartupInfoA
CompareFileTime
OpenProcess
GetModuleHandleA
InterlockedIncrement
VirtualProtect
MulDiv
lstrcpyA
GetSystemDirectoryA
GetStringTypeW
CreateDirectoryA
MoveFileA
msvcrt
exit
_acmdln
__p__commode
log
memchr
_adjust_fdiv
__p__fmode
__setusermatherr
sscanf
towlower
_XcptFilter
_except_handler3
__set_app_type
_initterm
__getmainargs
user32
RedrawWindow
IsWindowVisible
GetParent
UnregisterClassA
DialogBoxParamA
GetMessageA
GetMenuItemID
GetActiveWindow
GetClassNameA
GetCursorPos
SetPropA
gdi32
GetWindowOrgEx
CreateCompatibleBitmap
StretchBlt
CreateMetaFileW
GetRegionData
GetStockObject
SetDIBitsToDevice
ole32
CoFreeUnusedLibraries
OleDraw
CoGetMalloc
OleRun
CreateStreamOnHGlobal
CoInitializeSecurity
OleInitialize
CoLoadLibrary
StgOpenStorage
StgCreateDocfileOnILockBytes
CoRegisterClassObject
RevokeDragDrop
shell32
ExtractAssociatedIconW
SHFileOperationA
SHBrowseForFolderW
ShellExecuteExA
SHGetFolderPathW
SHCreateDirectoryExA
ShellExecuteEx
ShellExecuteW
advapi32
SetSecurityDescriptorOwner
GetTokenInformation
RegOpenKeyExW
GetUserNameA
IsValidSid
RegFlushKey
CheckTokenMembership
oleaut32
SafeArrayRedim
VariantCopy
SysAllocStringLen
VariantClear
SysStringLen
SafeArrayUnaccessData
VariantInit
GetActiveObject
version
VerLanguageNameA
VerFindFileW
VerInstallFileW
VerInstallFileA
comctl32
ImageList_DragEnter
ImageList_GetIconSize
ImageList_Destroy
ImageList_EndDrag
ImageList_AddMasked
Sections
.text Size: 63KB - Virtual size: 63KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 49KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ