Static task
static1
Behavioral task
behavioral1
Sample
78204858e437936f51961dd0587d430c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
78204858e437936f51961dd0587d430c.exe
Resource
win10v2004-20231215-en
General
-
Target
78204858e437936f51961dd0587d430c
-
Size
148KB
-
MD5
78204858e437936f51961dd0587d430c
-
SHA1
dee1298258b8e12dd559b5efa68045258a531270
-
SHA256
2f5e055d8557a663e3a149a584e73554a0c01ee7fe2f99edead0231811780d2b
-
SHA512
61ae14ae0ea755539d9d7300d226939346251e1b9d5d0030e859205ea6370686204b74ce7fc4389cc930baafc54fabcd6c68702db16734e90809f0de525be290
-
SSDEEP
3072:vU9Y+jMFO2eNU/4Amkdm070a2mn0tfuEHT92l/uZ2TJH/cbRb:vUDM0NUpdm3g09uEH5ZWSb
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 78204858e437936f51961dd0587d430c
Files
-
78204858e437936f51961dd0587d430c.exe windows:6 windows x86 arch:x86
f243bc9c1dbdb6b1babf40bf88dcd434
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateMutexW
GetLastError
CloseHandle
ReadProcessMemory
Sleep
ExitProcess
EnumResourceNamesW
FindResourceW
LoadResource
LockResource
SizeofResource
GetModuleFileNameW
CreateDirectoryW
CopyFileW
CreateProcessW
GetFileAttributesW
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GlobalFree
GetTickCount
GlobalLock
GlobalSize
GlobalUnlock
GlobalAlloc
CreateEventA
CreateThread
WaitForMultipleObjects
GetExitCodeThread
TerminateThread
SetLastError
SetEvent
WriteConsoleW
CreateFileW
SetFilePointerEx
GetConsoleMode
GetConsoleCP
FlushFileBuffers
HeapReAlloc
HeapSize
GetProcessHeap
LCMapStringW
GetStringTypeW
GetFileType
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
WideCharToMultiByte
MultiByteToWideChar
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetModuleHandleW
GetCurrentProcess
TerminateProcess
LocalFree
RtlUnwind
RaiseException
EncodePointer
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
GetStdHandle
WriteFile
GetModuleHandleExW
HeapFree
HeapAlloc
DecodePointer
shell32
SHGetSpecialFolderPathW
user32
DestroyWindow
DispatchMessageW
TranslateMessage
GetMessageW
AddClipboardFormatListener
CreateWindowExW
GetKeyboardLayoutList
GetWindowLongW
SetWindowLongW
RegisterClassW
GetClassInfoW
CloseWindow
DefWindowProcW
RemoveClipboardFormatListener
IsWindow
SetClipboardData
EmptyClipboard
GetClipboardData
CloseClipboard
OpenClipboard
IsClipboardFormatAvailable
ole32
CoInitializeEx
CoCreateInstance
CoUninitialize
oleaut32
VariantInit
SysFreeString
SysAllocString
Sections
.text Size: 86KB - Virtual size: 86KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ