Static task
static1
Behavioral task
behavioral1
Sample
61ad8469f118902a2f59f3cb6e1fc410d3f99aa77c87d6070ede5bdb58fd2707.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
61ad8469f118902a2f59f3cb6e1fc410d3f99aa77c87d6070ede5bdb58fd2707.exe
Resource
win10-20231215-en
General
-
Target
61ad8469f118902a2f59f3cb6e1fc410d3f99aa77c87d6070ede5bdb58fd2707
-
Size
448KB
-
MD5
63a09ec9c63805c4bdec871cdcb5dc01
-
SHA1
1226573a6b7b02d017d4f84a6bbd925432931284
-
SHA256
61ad8469f118902a2f59f3cb6e1fc410d3f99aa77c87d6070ede5bdb58fd2707
-
SHA512
088b1096a9a0c57b84ba428450bc4af3c3c8ace4bcdfc420946fbf1629931bb4986ac2736ab29f8e1263c14103cb1b5f0ea3def40bb9f5f2c56c9099adec8979
-
SSDEEP
6144:nC5hyUR+MhyfUj6qfoPXYfIrvQ/zabJzYbLkBWBXpMcwLbjJgSqtUg83T36XE24r:v+BoPmID/mQmpMcmSSIU16XE2e5L
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 61ad8469f118902a2f59f3cb6e1fc410d3f99aa77c87d6070ede5bdb58fd2707
Files
-
61ad8469f118902a2f59f3cb6e1fc410d3f99aa77c87d6070ede5bdb58fd2707.exe windows:5 windows x86 arch:x86
55ad6bfe47219bd08f4db9b7b6e7d559
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapCreate
GetModuleHandleA
CreateEventA
WaitForSingleObject
CloseHandle
HeapDestroy
GetModuleFileNameW
lstrlenW
HeapFree
MulDiv
GetProcessHeap
HeapAlloc
GetStartupInfoA
user32
GetScrollRange
GetClassInfoExW
GetClassInfoW
FillRect
CharUpperBuffW
DispatchMessageW
KillTimer
EndMenu
PeekMessageW
EndPaint
FrameRect
IsIconic
LoadBitmapW
GetWindowTextW
DestroyWindow
SetScrollPos
DrawMenuBar
GetMenuStringW
DrawIcon
GetClientRect
BeginPaint
DeleteMenu
LoadIconW
CopyImage
ShowCaret
DefFrameProcW
LoadCursorW
RegisterClassW
SetTimer
GetDCEx
CreateMenu
IsZoomed
DrawFocusRect
GetSystemMenu
GetScrollPos
CreateWindowExW
GetMenuItemInfoW
DestroyMenu
GetCursor
DefMDIChildProcW
ReleaseDC
GetScrollInfo
DestroyCursor
EnableWindow
ShowWindow
CreateAcceleratorTableW
InsertMenuW
GetDlgCtrlID
SetMenuItemInfoW
CreateIcon
gdi32
RestoreDC
Polygon
MoveToEx
CreateICW
RectVisible
CreatePalette
GetTextMetricsW
PolyBezierTo
SetRectRgn
CreateDCW
GetWindowOrgEx
ole32
CoInitialize
CoTaskMemFree
CoCreateInstance
CoTaskMemAlloc
CoUninitialize
oleaut32
SafeArrayCreate
SafeArrayAccessData
VariantChangeType
SysFreeString
SysAllocStringLen
SafeArrayGetUBound
SafeArrayUnaccessData
SafeArrayGetElement
GetErrorInfo
VariantInit
SysReAllocStringLen
VariantCopy
SafeArrayPtrOfIndex
SafeArrayGetLBound
VariantCopyInd
SafeArrayPutElement
VariantClear
msvcrt
__p__fmode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
memcpy
qsort
wcsrchr
memset
wcschr
__set_app_type
_except_handler3
_controlfp
__p__commode
Sections
.text Size: 58KB - Virtual size: 57KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.textbss Size: - Virtual size: 64KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 385KB - Virtual size: 384KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ