Static task
static1
Behavioral task
behavioral1
Sample
4760b2855771b3378b18698c0fd052de.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4760b2855771b3378b18698c0fd052de.exe
Resource
win10v2004-20231222-en
General
-
Target
4760b2855771b3378b18698c0fd052de
-
Size
22KB
-
MD5
4760b2855771b3378b18698c0fd052de
-
SHA1
abc0c83e4c112b9b2d484ee1e45e0ecf0abeb448
-
SHA256
79fb79eda05500054e511ec825e77184bca8ce054a2fd57c7644f40f2a880607
-
SHA512
3a108924c734d6db76d2cc35cc99b3eb21b61134b4d88855f0bca4aeaac00dda981fd0e6a25bc0c89ede1ab5b26b8fc25b3f2841fdf6b67a7287038cb0463735
-
SSDEEP
384:+w/s5Z0JKh0nt7+4LtnspTdy0XMVWWGwFwGCup8+alTbD+ib4:+wE5G00t7L1s1OFwS8+alT+iM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4760b2855771b3378b18698c0fd052de
Files
-
4760b2855771b3378b18698c0fd052de.exe windows:4 windows x86 arch:x86
05f168553f77843c6e8a9037f9373579
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
CascadeChildWindows
InvalidateRgn
InSendMessage
DdeQueryStringW
CtxInitUser32
DrawTextA
RealChildWindowFromPoint
LookupIconIdFromDirectoryEx
ReleaseCapture
GetClassInfoA
LoadKeyboardLayoutA
DrawFrame
SendDlgItemMessageA
EditWndProc
DdeQueryStringA
GetTitleBarInfo
CopyRect
WaitForInputIdle
GetMenuItemInfoA
GetClassNameW
AllowSetForegroundWindow
LoadIconA
GetDCEx
GetUserObjectInformationA
SetWindowWord
gdi32
GdiConvertToDevmodeW
SetMapMode
CreateEnhMetaFileA
GetObjectA
GdiEntry4
GdiConvertAndCheckDC
AddFontResourceTracking
PolyTextOutA
EngLockSurface
GdiResetDCEMF
GetLogColorSpaceA
SetICMProfileA
RectInRegion
CreatePalette
SetROP2
GdiEntry6
GetEUDCTimeStampExW
GdiGetSpoolMessage
GdiTransparentBlt
GdiEntry6
GetNearestColor
OffsetViewportOrgEx
SetBitmapDimensionEx
CreatePenIndirect
GetWorldTransform
EngBitBlt
EngWideCharToMultiByte
cGetTTFFromFOT
GetDCBrushColor
TextOutW
advapi32
AccessCheckByTypeResultListAndAuditAlarmA
SetAclInformation
CommandLineFromMsiDescriptor
I_ScGetCurrentGroupStateW
LsaEnumerateTrustedDomains
ObjectDeleteAuditAlarmA
ConvertAccessToSecurityDescriptorA
SystemFunction005
LookupPrivilegeDisplayNameW
SystemFunction030
EnumServicesStatusExW
InitiateSystemShutdownExW
AbortSystemShutdownA
CopySid
ConvertAccessToSecurityDescriptorA
AdjustTokenPrivileges
LookupPrivilegeDisplayNameW
QueryServiceLockStatusA
WmiOpenBlock
ControlService
RegQueryMultipleValuesW
SetKernelObjectSecurity
CreateRestrictedToken
SystemFunction024
BuildTrusteeWithObjectsAndNameA
LsaQueryTrustedDomainInfo
ObjectPrivilegeAuditAlarmA
DeleteService
SetEntriesInAclW
NotifyChangeEventLog
shell32
SheChangeDirA
StrRChrIA
RealShellExecuteW
SHGetSettings
DragQueryFileAorW
SHGetSettings
SHHelpShortcuts_RunDLLA
ShellExec_RunDLLA
Shell_NotifyIconW
SHCreateProcessAsUserW
StrStrA
Control_RunDLLA
RealShellExecuteExA
SHExtractIconsW
SHUpdateRecycleBinIcon
SHGetSpecialFolderLocation
SHEmptyRecycleBinW
SHBrowseForFolderW
SHInvokePrinterCommandA
Shell_NotifyIconA
CheckEscapesW
SHHelpShortcuts_RunDLLW
InternalExtractIconListA
DllCanUnloadNow
DllGetClassObject
SHGetDiskFreeSpaceExA
SHGetFileInfoA
ExtractIconW
SHGetDesktopFolder
kernel32
CreateHardLinkA
CreateFileW
_hread
WritePrivateProfileStringW
ReadDirectoryChangesW
AddAtomA
VerifyVersionInfoW
GetShortPathNameW
lstrlenA
OpenFileMappingA
GetUserDefaultUILanguage
GetProcessPriorityBoost
GetLastError
SetLastConsoleEventActive
ReadConsoleOutputW
SetVolumeLabelW
GetVersionExW
SetConsoleMode
Heap32Next
GetCurrentDirectoryA
SetConsoleTextAttribute
IsBadHugeWritePtr
Sections
.text Size: 16KB - Virtual size: 28KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ