Static task
static1
Behavioral task
behavioral1
Sample
751cf28633b111f19c137e00d7c67f3e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
751cf28633b111f19c137e00d7c67f3e.exe
Resource
win10v2004-20231215-en
General
-
Target
751cf28633b111f19c137e00d7c67f3e
-
Size
5.1MB
-
MD5
751cf28633b111f19c137e00d7c67f3e
-
SHA1
7ca4bf70e9a976a0aa33f0bb7c9fa6fd3fef77c1
-
SHA256
73d7408f3b370e3a9b6f0cb45047279072c98c5c0eb620eb9f8fcc202d08606b
-
SHA512
7c185d93d5bd789224ffbcaaf89665b834bcc1fa36411f978944c38591b81fdb78121c0428d4cfed8788bfcf048ed7a21e6ac2b69eb924ce92eccf1b0e6c8b05
-
SSDEEP
98304:aktY/qUjDJkPUv8z2+h2Ueft77itEejPGRkd9FtWz4lN7iS541VQSqL/I:rSyUHJaSg2h37iuejPGRkdTi4n7Lq1Wk
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 751cf28633b111f19c137e00d7c67f3e
Files
-
751cf28633b111f19c137e00d7c67f3e.exe windows:4 windows x86 arch:x86
cac57a9819ebb12d201ad2829c42287a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetVersionExA
GetTempPathA
GetModuleFileNameA
GetDiskFreeSpaceA
lstrlenA
GetDriveTypeA
GetCurrentProcess
WinExec
GlobalUnlock
GlobalFree
GlobalAlloc
GlobalLock
CloseHandle
SetFilePointer
WriteFile
ReadFile
CreateFileA
SetCurrentDirectoryA
MoveFileExA
FormatMessageA
lstrcatA
CopyFileA
SetFileTime
GetShortPathNameA
LoadLibraryA
GetProcAddress
FreeLibrary
WritePrivateProfileStringA
GetPrivateProfileStringA
GetWindowsDirectoryA
GetSystemDirectoryA
GetSystemTime
GetTickCount
GetExitCodeProcess
CreateProcessA
GetFullPathNameA
MultiByteToWideChar
GlobalHandle
FindClose
FindFirstFileA
UnhandledExceptionFilter
GetACP
GetCPInfo
GetOEMCP
LCMapStringA
WideCharToMultiByte
LCMapStringW
HeapReAlloc
VirtualAlloc
IsBadWritePtr
HeapCreate
HeapDestroy
VirtualFree
GetVersion
GetCommandLineA
GetEnvironmentVariableA
GetModuleHandleA
RaiseException
GetStartupInfoA
CreateDirectoryA
SetUnhandledExceptionFilter
RtlUnwind
HeapCompact
MoveFileA
TerminateProcess
ExitProcess
GetLastError
DeleteFileA
SetEnvironmentVariableA
GetFileAttributesA
SetFileAttributesA
HeapAlloc
HeapFree
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetStringTypeA
GetStringTypeW
GetCurrentDirectoryA
IsBadReadPtr
IsBadCodePtr
user32
IsDlgButtonChecked
SetTimer
CloseClipboard
GetWindowRect
GetDlgItem
KillTimer
CheckRadioButton
MessageBoxA
CreateDialogIndirectParamA
IsDialogMessageA
GetMessageA
TranslateMessage
DispatchMessageA
DestroyWindow
EnableWindow
SetFocus
GetClipboardData
ShowWindow
wsprintfA
OpenClipboard
IsClipboardFormatAvailable
GetDlgItemTextA
SendDlgItemMessageA
SetDlgItemTextA
PeekMessageA
SendMessageA
EndPaint
BeginPaint
GetQueueStatus
SetWindowLongA
GetWindowLongA
CheckDlgButton
RegisterWindowMessageA
SetWindowTextA
GetParent
GetDC
ReleaseDC
DrawTextA
FillRect
GetWindow
LoadCursorA
CreateWindowExA
LoadIconA
GetLastActivePopup
RegisterClassA
FindWindowA
AdjustWindowRectEx
BringWindowToTop
GetSystemMetrics
ExitWindowsEx
UpdateWindow
DialogBoxIndirectParamA
IsIconic
DefWindowProcA
PostQuitMessage
EndDialog
RedrawWindow
PostMessageA
ScreenToClient
GetClientRect
SetWindowPos
GetSysColor
OemToCharA
gdi32
GetStockObject
DeleteObject
CreateFontIndirectA
GetObjectA
ExtTextOutA
SetBkColor
CreatePalette
GetSystemPaletteEntries
GetDeviceCaps
StretchDIBits
RealizePalette
SelectPalette
IntersectClipRect
CreateDIBPatternBrush
SetTextColor
SetBkMode
SelectObject
DeleteDC
BitBlt
CreateCompatibleBitmap
CreateCompatibleDC
CreateSolidBrush
AddFontResourceA
comdlg32
GetSaveFileNameA
GetOpenFileNameA
advapi32
RegCreateKeyA
RegCloseKey
RegQueryValueExA
RegOpenKeyA
RegSetValueExA
RegOpenKeyExA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegQueryValueA
shell32
SHGetPathFromIDListA
DragQueryFileA
SHGetSpecialFolderLocation
ShellExecuteA
DragFinish
DragAcceptFiles
ole32
CoCreateInstance
OleInitialize
OleUninitialize
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
VerFindFileA
Sections
.text Size: 60KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ