Static task
static1
Behavioral task
behavioral1
Sample
621369aee8cbed42d7b2333d975302f7.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
621369aee8cbed42d7b2333d975302f7.exe
Resource
win10v2004-20231215-en
General
-
Target
621369aee8cbed42d7b2333d975302f7
-
Size
150KB
-
MD5
621369aee8cbed42d7b2333d975302f7
-
SHA1
838f0476c252b9389c738d0dc60cb594e9ac3308
-
SHA256
e2897559f65cecf89e73c95088988236a8713cc8210997aa7a6b1cfcecc5e968
-
SHA512
98627dd79321aae72dbad67dabe9f40c0ba78c043ef3dccb66ea5201be75d3f2fc0db92a6a3283d49aebb86547444663def3bc165343e8e991d5a7c410c8ca5c
-
SSDEEP
3072:aLQ7iWUUSirDhkeZ0rWbSaJHp6Q15Yc8zfTBfCV:BC8ALa76Qvj8rTBqV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 621369aee8cbed42d7b2333d975302f7
Files
-
621369aee8cbed42d7b2333d975302f7.exe windows:4 windows x86 arch:x86
4faac30c3690c047de698c34a211db88
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
memset
sprintf
strcmp
strncmp
strlen
strcpy
memcpy
fread
_setjmp3
fopen
fclose
strncpy
strcat
_snprintf
abort
_CIpow
gmtime
__p__iob
fprintf
longjmp
malloc
free
strtod
fwrite
fflush
kernel32
GetModuleHandleA
HeapCreate
HeapDestroy
ExitProcess
HeapFree
HeapAlloc
SetLastError
InitializeCriticalSection
GetCurrentThreadId
GetCurrentProcessId
CreateFileA
WriteFile
CloseHandle
GetDriveTypeA
FindFirstFileA
FindClose
GetFileAttributesA
SetFilePointer
LoadLibraryA
GetProcAddress
FreeLibrary
GlobalAlloc
GlobalFree
HeapReAlloc
comctl32
InitCommonControls
InitCommonControlsEx
user32
LoadCursorA
SetSystemCursor
GetDesktopWindow
GetDC
ReleaseDC
GetWindow
SetActiveWindow
RemovePropA
SendMessageA
DestroyWindow
UnregisterClassA
DestroyAcceleratorTable
LoadIconA
RegisterClassA
AdjustWindowRect
GetSystemMetrics
GetActiveWindow
GetWindowRect
CreateWindowExA
SetPropA
ShowWindow
CreateAcceleratorTableA
PeekMessageA
MsgWaitForMultipleObjects
GetMessageA
TranslateAcceleratorA
TranslateMessage
DispatchMessageA
SetCursorPos
LoadImageA
SetCursor
GetWindowLongA
GetParent
MapWindowPoints
MoveWindow
SystemParametersInfoA
GetKeyState
SetCapture
PostMessageA
GetCursorPos
ReleaseCapture
GetPropA
GetClientRect
FillRect
EnumChildWindows
DefFrameProcA
DefWindowProcA
IsWindowEnabled
IsWindowVisible
SetFocus
GetFocus
IsChild
GetClassNameA
CallWindowProcA
SetWindowLongA
EnableWindow
GetWindowTextLengthA
GetWindowTextA
RegisterClassExA
SetForegroundWindow
BringWindowToTop
MessageBoxA
GetWindowThreadProcessId
GetForegroundWindow
EnumWindows
DestroyIcon
EnumDisplaySettingsA
DrawIconEx
gdi32
BitBlt
DeleteObject
GetStockObject
GetObjectType
CreateCompatibleDC
SelectObject
DeleteDC
GetObjectA
GetDIBits
CreateDCA
CreateCompatibleBitmap
CreateDIBSection
GetDeviceCaps
CreateSolidBrush
CreatePen
SetTextAlign
SetTextColor
SelectPalette
RealizePalette
SetStretchBltMode
StretchDIBits
StretchBlt
SetROP2
SetBkMode
SetPixelV
Rectangle
SetBkColor
ole32
RevokeDragDrop
CoInitialize
Sections
.code Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 118KB - Virtual size: 117KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE