Static task
static1
Behavioral task
behavioral1
Sample
76ddcc0feaef70627dc139da0635d766.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
76ddcc0feaef70627dc139da0635d766.exe
Resource
win10v2004-20231222-en
General
-
Target
76ddcc0feaef70627dc139da0635d766
-
Size
189KB
-
MD5
76ddcc0feaef70627dc139da0635d766
-
SHA1
64266b2999033ec2eb00815dc286304b700cd0c0
-
SHA256
7dd2050c5be77d30c72e36d63e860bff108d170907333efc5253969c26dda541
-
SHA512
9772838c4336518cada4559486be9df144d4951cdc33e834a3f3c0dc9bf5b487c54f83b949be17904e27eb327dfebe12451a9569c151f18458732636ae07657b
-
SSDEEP
3072:0Dl5pFhZEhq6+KDaCLwNT3HNMDOC6sF9JJZvKStGrQYxGlnoL6:0Dl5pm/GJZ3HaDOri9VKSIyo6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 76ddcc0feaef70627dc139da0635d766
Files
-
76ddcc0feaef70627dc139da0635d766.exe windows:4 windows x86 arch:x86
02f0e06349d44a61c7e6d1200d2cd3bf
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
QueryPerformanceCounter
QueryPerformanceFrequency
ExitThread
GetTickCount
GetSystemDirectoryA
GetLocalTime
Sleep
MultiByteToWideChar
ReadFile
CloseHandle
WriteFile
TransactNamedPipe
CreateFileA
GetModuleFileNameA
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
FindNextFileA
FindFirstFileA
SetFilePointer
GetFileSize
GetTimeFormatA
GetDateFormatA
GetLastError
CreateThread
GetFileAttributesA
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
HeapFree
HeapAlloc
GetProcessHeap
VirtualQueryEx
ReadProcessMemory
GetSystemInfo
OpenProcess
FreeLibrary
GetEnvironmentVariableW
GetProcAddress
LoadLibraryA
GetModuleHandleA
FormatMessageA
GlobalUnlock
GlobalLock
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
SetFileTime
GetFileTime
CreateProcessA
ExpandEnvironmentStringsA
SetFileAttributesA
GetTempPathA
GetExitCodeProcess
PeekNamedPipe
DuplicateHandle
GetCurrentProcess
CreatePipe
GetVersionExA
GlobalMemoryStatus
ExitProcess
WideCharToMultiByte
GetComputerNameA
TerminateProcess
TerminateThread
DeleteFileA
MoveFileA
GetCurrentProcessId
CopyFileA
WaitForSingleObject
CreateMutexA
SetConsoleCtrlHandler
GetLocaleInfoA
GetLogicalDrives
GenerateConsoleCtrlEvent
WaitForMultipleObjects
HeapSize
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
InterlockedExchange
GetCurrentThreadId
FlushFileBuffers
SetStdHandle
GetStringTypeW
GetStringTypeA
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetSystemTimeAsFileTime
HeapReAlloc
RtlUnwind
GetStartupInfoA
GetCommandLineA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
VirtualProtect
VirtualQuery
LCMapStringA
LCMapStringW
GetACP
GetOEMCP
GetCPInfo
GetStdHandle
SetEndOfFile
ws2_32
setsockopt
ioctlsocket
bind
listen
select
__WSAFDIsSet
accept
recv
send
WSAStartup
socket
inet_addr
htons
connect
closesocket
WSACleanup
Sections
.text Size: 122KB - Virtual size: 122KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 41KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 14KB - Virtual size: 330KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE