Static task
static1
Behavioral task
behavioral1
Sample
67a4441f661afcb0d650df88d438a91a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
67a4441f661afcb0d650df88d438a91a.exe
Resource
win10v2004-20231215-en
General
-
Target
67a4441f661afcb0d650df88d438a91a
-
Size
103KB
-
MD5
67a4441f661afcb0d650df88d438a91a
-
SHA1
d7888536a5c83c55f3146568889701acec2ef87c
-
SHA256
cfecd2249a899cfdeab0b74f7a46698a3dc898eee872d6289816d971638d719f
-
SHA512
432d2d7812892a8adb46d56c57b3f725fdee80b4b0ba6c985752948d11905d429a9f8af47a9933ebea7db27120541276611b60e9b47d64a9719389f4327e9607
-
SSDEEP
1536:ohXiZhsHwLIBonPQkScNF1pa8gnKlRZDfInmxY5lHkxrhC:ohSZh4wMuPMq0qDsmx+O
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 67a4441f661afcb0d650df88d438a91a
Files
-
67a4441f661afcb0d650df88d438a91a.exe windows:4 windows x86 arch:x86
ffca4ed3b5b6907540b2c5f3ceae0dbd
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetMenuStringA
DispatchMessageA
CharLowerBuffA
DefMDIChildProcA
CreateMenu
DrawIconEx
FillRect
EnableWindow
MessageBoxA
GetActiveWindow
GetKeyNameTextA
SetCursor
GetDlgItem
GetClipboardData
EnumChildWindows
GetCapture
GetSysColor
ShowWindow
EqualRect
IsWindowVisible
DrawFrameControl
SetWindowPos
GetIconInfo
BeginPaint
CallNextHookEx
DrawTextA
DeferWindowPos
IsMenu
EndPaint
DefWindowProcA
GetLastActivePopup
EnumThreadWindows
CheckMenuItem
GetScrollPos
TrackPopupMenu
GetCursorPos
EnableScrollBar
SetWindowLongA
CallWindowProcA
DispatchMessageW
IsWindowEnabled
DefFrameProcA
FrameRect
SetWindowTextA
EndDeferWindowPos
GetMenuItemCount
EnumWindows
GetWindow
GetCursor
GetKeyState
ClientToScreen
ShowScrollBar
GetMessagePos
GetDesktopWindow
CreateIcon
IsChild
GetScrollRange
GetParent
CharNextA
msvcrt
cos
memmove
strncmp
kernel32
RaiseException
CloseHandle
GlobalFindAtomA
GetCurrentThread
LockResource
HeapDestroy
WideCharToMultiByte
GetFileSize
GetProcAddress
SetEndOfFile
CreateFileA
MoveFileA
GetLocalTime
ReadFile
GetVersionExA
FreeResource
VirtualAlloc
SizeofResource
GetStartupInfoA
GetDateFormatA
GetStdHandle
GlobalDeleteAtom
GetSystemDefaultLangID
GlobalAlloc
MulDiv
Sleep
SetThreadLocale
EnterCriticalSection
DeleteFileA
GetCurrentThreadId
VirtualFree
VirtualQuery
ResetEvent
GetCPInfo
FindClose
GlobalAddAtomA
GetCurrentProcessId
LoadLibraryA
LoadResource
LocalReAlloc
GetFileType
ExitProcess
InitializeCriticalSection
SetLastError
WriteFile
HeapFree
GetACP
VirtualAllocEx
GetStringTypeW
FindResourceA
HeapAlloc
GetDiskFreeSpaceA
CreateEventA
lstrcmpiA
FormatMessageA
GetTickCount
GetEnvironmentStrings
CreateThread
lstrlenA
WaitForSingleObject
FreeLibrary
MoveFileExA
GetFullPathNameA
GetOEMCP
lstrcpynA
LocalAlloc
SetErrorMode
GetProcessHeap
GetCommandLineA
LoadLibraryExA
GetUserDefaultLCID
GetFileAttributesA
GetModuleHandleA
DeleteCriticalSection
ExitThread
lstrcatA
GetLocaleInfoA
CompareStringA
Sections
.text Size: 52KB - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.init Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 41KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
INIT Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE