Static task
static1
Behavioral task
behavioral1
Sample
797c5545780bb2f53576e53dcc3817be.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
797c5545780bb2f53576e53dcc3817be.exe
Resource
win10v2004-20231215-en
General
-
Target
797c5545780bb2f53576e53dcc3817be
-
Size
246KB
-
MD5
797c5545780bb2f53576e53dcc3817be
-
SHA1
99c177c1cfe8208afac46f7c788cdabb55add3fb
-
SHA256
6ad158e901a9fe3e5c0a7a74a0a8a5bb089022bf61e73f18e25f24b12915ba4c
-
SHA512
4ac2ffbf33d921ddc9d0b8749e7cc9cd89fa89f3b8880b391aba5663a692a0ab2632e8f826271c88e363c5c9b21191e311513b1ab2d8dfc35c705e8fee781ad8
-
SSDEEP
6144:PdyaDgSqCwOAua7kwrZrSV6OCQB86jEVUKCnY0Iu:PlMH3uaJ62EEVU6u
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 797c5545780bb2f53576e53dcc3817be
Files
-
797c5545780bb2f53576e53dcc3817be.exe windows:4 windows x86 arch:x86
45f637f018279ea291645a4588a8db71
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetVersion
GetVolumeInformationW
FindAtomW
GetProcAddress
AddAtomW
LoadLibraryExA
WinExec
GetDiskFreeSpaceA
DosDateTimeToFileTime
GetThreadLocale
GetShortPathNameA
GetCurrentDirectoryW
OpenMutexA
ExitProcess
GetAtomNameA
lstrlenA
GetTimeFormatW
HeapCreate
AddAtomA
GetStartupInfoA
GetCurrentDirectoryA
LocalFree
lstrcmpW
user32
SetWindowTextA
CharPrevA
ShowCursor
GetCaretPos
WaitForInputIdle
IsMenu
UpdateLayeredWindow
DestroyIcon
CreateWindowExW
GetDlgItemTextA
SetWindowTextW
CreateWindowExA
WaitMessage
UnregisterClassA
keybd_event
InsertMenuA
SetMenu
mouse_event
MessageBoxW
DestroyCursor
SetParent
EnableMenuItem
RemoveMenu
SetDlgItemTextW
DialogBoxParamW
GetSysColorBrush
gdi32
GetRasterizerCaps
CreateSolidBrush
CreateBitmapIndirect
CreateScalableFontResourceA
CreateRoundRectRgn
CreateFontW
RemoveFontResourceA
CreateDIBPatternBrushPt
CreateFontA
GetMetaFileA
CreateBitmap
CreateScalableFontResourceW
GetObjectType
GetEnhMetaFilePixelFormat
CreatePolygonRgn
CreateICW
CreateMetaFileA
CreateEllipticRgn
CreatePolyPolygonRgn
CreateICA
GetTextExtentPointA
GetTextExtentPointW
advapi32
RegQueryValueW
RegCreateKeyExA
RegSetValueW
RegDeleteValueW
RegEnumValueA
RegQueryValueA
RegOpenKeyW
RegFlushKey
RegSetValueA
RegReplaceKeyW
RegDeleteKeyA
shell32
ExtractAssociatedIconExW
StrChrA
Shell_NotifyIconW
SHCreateDirectoryExW
ShellExecuteW
StrNCmpIA
Shell_NotifyIconA
StrChrW
SHCreateDirectoryExA
StrNCmpIW
StrStrW
SHBrowseForFolderA
ExtractIconW
ws2_32
WSAEnumProtocolsA
WSACreateEvent
htonl
htons
WSAEventSelect
WSAIoctl
closesocket
recvfrom
WSAGetLastError
getnameinfo
getprotobynumber
WSASendTo
connect
inet_ntoa
getprotobyname
select
urlmon
CoInstall
CompareSecurityIds
CoGetClassObjectFromURL
WriteHitLogging
CDLGetLongPathNameW
HlinkSimpleNavigateToMoniker
DllUnregisterServer
URLDownloadToCacheFileA
URLOpenStreamW
HlinkNavigateString
Extract
GetComponentIDFromCLSSPEC
CoInternetParseUrl
ObtainUserAgentString
IsLoggingEnabledW
CreateAsyncBindCtx
AsyncGetClassBits
URLDownloadToFileW
URLOpenBlockingStreamA
oledlg
OleUIConvertW
OleUIUpdateLinksA
OleUIObjectPropertiesW
OleUIAddVerbMenuW
OleUICanConvertOrActivateAs
Sections
.uWZ Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.HzMrF Size: 92KB - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.cJ Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.g Size: 1KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.BvW Size: 4KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xl Size: 91KB - Virtual size: 90KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.cb Size: 11KB - Virtual size: 310KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.FK Size: 5KB - Virtual size: 495KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ