Static task
static1
Behavioral task
behavioral1
Sample
75a4fc51f866a2ee22faedd4192e8ab2.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
75a4fc51f866a2ee22faedd4192e8ab2.exe
Resource
win10v2004-20231215-en
General
-
Target
75a4fc51f866a2ee22faedd4192e8ab2
-
Size
93KB
-
MD5
75a4fc51f866a2ee22faedd4192e8ab2
-
SHA1
a0f0b34f4cb87ec983547217ea41793370f898be
-
SHA256
d466311a497b8fa9e0b4c3eaece231346f220a96c5e35bee6b6d199de10c8c35
-
SHA512
7f7fcde33e4c98131d003f831b7abb5196a21aa5e0dd9b0328f2655282ca6790bc226c6e98e99d813372208795433f2350fd03aba29af3327620f90b1cbd5ec0
-
SSDEEP
1536:W7WU3gcb7dTQzuV2LSUdY4fl5rOruOhgOP9nqTIqslLTfx/h07ad/6QtRVLR/rga:W7WyRVQ6UrXlYCO6OPpqTk/Z60y0f/rc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 75a4fc51f866a2ee22faedd4192e8ab2
Files
-
75a4fc51f866a2ee22faedd4192e8ab2.exe windows:4 windows x86 arch:x86
68063ae4a5a1f656d290211e66062640
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntdll
NtWaitForSingleObject
user32
GetScrollInfo
DeferWindowPos
SetWindowTextA
ShowWindow
GetScrollRange
CreateWindowExA
CallNextHookEx
CharLowerA
EqualRect
GetDesktopWindow
EnumWindows
DefFrameProcA
GetPropA
GetCapture
IsWindowEnabled
IsMenu
GetClassLongA
DrawMenuBar
GetMenuItemCount
CharNextA
DrawTextA
GetMenu
GetMenuItemInfoA
HideCaret
FillRect
GetParent
EnumThreadWindows
GetDlgItem
CharLowerBuffA
ShowScrollBar
EndDeferWindowPos
GetWindowTextA
GetSysColorBrush
GetKeyState
IsChild
FrameRect
GetSysColor
CreateIcon
DrawEdge
TrackPopupMenu
GetScrollPos
GetCursor
EnableWindow
GetMessagePos
GetClassInfoA
DefMDIChildProcA
DrawIconEx
DefWindowProcA
GetDC
GetMenuItemID
MessageBoxA
GetActiveWindow
GetSubMenu
CharToOemA
GetMenuStringA
GetClipboardData
GetClientRect
SetCursor
CheckMenuItem
SetWindowLongA
DrawIcon
SetTimer
ClientToScreen
EnableMenuItem
GetLastActivePopup
GetDCEx
DrawFrameControl
GetMenuState
EndPaint
SystemParametersInfoA
FindWindowA
GetCursorPos
GetKeyNameTextA
RegisterClassA
DispatchMessageW
CreateMenu
BeginPaint
CallWindowProcA
EnumChildWindows
BeginDeferWindowPos
CreatePopupMenu
GetIconInfo
kernel32
SetErrorMode
GetModuleFileNameA
GetCommandLineA
Sleep
MulDiv
lstrcpyA
FreeLibrary
CreateThread
FindFirstFileA
SetLastError
GetCurrentThread
WideCharToMultiByte
GetVersion
EnterCriticalSection
LocalFree
ResetEvent
GetFullPathNameA
HeapDestroy
LocalReAlloc
GlobalDeleteAtom
SetHandleCount
CompareStringA
WriteFile
LoadLibraryExA
SetEndOfFile
GetLastError
MoveFileExA
GetCurrentProcess
GetThreadLocale
LoadResource
GetVersionExA
MoveFileA
DeleteCriticalSection
GlobalAddAtomA
CreateFileA
GetCurrentProcessId
ExitThread
GlobalFindAtomA
VirtualAllocEx
GetStringTypeW
LockResource
FindResourceA
HeapFree
ole32
CoGetContextToken
CoDisconnectObject
msvcrt
memset
calloc
_acmdln
sprintf
time
memmove
sqrt
memcpy
rand
mbstowcs
wcschr
clock
tolower
malloc
wcscspn
atol
wcstol
wcsncmp
srand
exit
swprintf
Sections
.data Size: 34KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.init Size: 47KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 411B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: 512B - Virtual size: 411B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 571B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ