Static task
static1
Behavioral task
behavioral1
Sample
785c9b10296e97aaaec034a20f3e0f44.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
785c9b10296e97aaaec034a20f3e0f44.exe
Resource
win10v2004-20231222-en
General
-
Target
785c9b10296e97aaaec034a20f3e0f44
-
Size
535KB
-
MD5
785c9b10296e97aaaec034a20f3e0f44
-
SHA1
e2b410e8756c361649de102a536220aaa381d20a
-
SHA256
3b030742818104673ed1e575f1dae82642521842c0e0e6880310a94f5cdbb25c
-
SHA512
2651e8ed7533c5c7af8e8239c149c194d9dfb60957e31d3a71e35f0a1e32746a139b421a9b2db9c202ce2d2840342d145b81563542a36aaacd06184f6cf3c815
-
SSDEEP
12288:Bxd5TPnibqZqlWC/R55lIeALeOB1ID22NNyuy:3nubqIlWC/nIeAWTNN9y
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 785c9b10296e97aaaec034a20f3e0f44
Files
-
785c9b10296e97aaaec034a20f3e0f44.exe windows:5 windows x86 arch:x86
9ce47cbf762b5420a6c9989a200095ec
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetSystemTimeAsFileTime
IsValidCodePage
LoadLibraryW
MultiByteToWideChar
HeapSize
GetCPInfo
GetACP
GetCurrentProcessId
HeapReAlloc
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetFilePointer
ReadFile
GetStringTypeW
LCMapStringW
WriteConsoleW
SetStdHandle
CreateFileW
ExitProcess
WTSGetActiveConsoleSessionId
FormatMessageA
WideCharToMultiByte
LocalFree
LocalAlloc
GetCurrentProcess
ReadConsoleInputA
SetConsoleMode
GetStdHandle
HeapAlloc
GetLastError
CreateFileA
GetProcAddress
GetModuleHandleA
lstrcmpiA
CloseHandle
GetTickCount
QueryPerformanceCounter
InterlockedDecrement
GetCurrentThreadId
InterlockedIncrement
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetModuleFileNameA
IsProcessorFeaturePresent
CreateProcessW
SetLastError
MulDiv
lstrcpyA
lstrlenA
GetOEMCP
Sleep
DeleteCriticalSection
GetFileType
InitializeCriticalSectionAndSpinCount
GetThreadLocale
LoadLibraryA
HeapFree
RaiseException
EnterCriticalSection
LeaveCriticalSection
GetCommandLineA
HeapSetInformation
GetStartupInfoW
GetModuleHandleW
DecodePointer
WriteFile
GetModuleFileNameW
HeapCreate
EncodePointer
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
RtlUnwind
SetHandleCount
user32
LoadMenuA
SendMessageA
OffsetRect
CreateWindowExA
GetDC
DrawTextA
AppendMenuA
CreateMenu
LoadBitmapA
EnumDisplayMonitors
GetWindowTextA
GetSysColor
GetWindowWord
GetSysColorBrush
GetClientRect
wsprintfA
GetMessageA
LoadAcceleratorsA
GetWindowLongA
GetDlgItemTextA
IsDlgButtonChecked
GetParent
GetDlgItem
DestroyWindow
ReleaseDC
SetRect
gdi32
SetBkColor
GetRegionData
RemoveFontMemResourceEx
RectVisible
PtVisible
SetROP2
SetBkMode
SetDCPenColor
SetDCBrushColor
SetTextColor
SetArcDirection
SetBrushOrgEx
GetStockObject
SelectObject
GetObjectA
GetPixel
SetMapMode
CreateFontIndirectA
DeleteObject
GetDeviceCaps
SetGraphicsMode
SetStretchBltMode
advapi32
LookupPrivilegeValueA
CryptAcquireContextA
CryptCreateHash
CryptHashData
CryptEncrypt
CryptDestroyKey
DuplicateTokenEx
CryptGetKeyParam
ImpersonateLoggedOnUser
LogonUserA
CryptSetProvParam
CryptGetUserKey
CryptAcquireContextW
CryptGetDefaultProviderA
GetNamedSecurityInfoA
OpenProcessToken
FreeSid
CheckTokenMembership
AllocateAndInitializeSid
IsValidSecurityDescriptor
SetSecurityDescriptorDacl
SetSecurityDescriptorGroup
SetSecurityDescriptorOwner
InitializeSecurityDescriptor
AddAccessAllowedAce
AddAccessDeniedAce
InitializeAcl
LookupAccountNameW
CryptReleaseContext
CryptDestroyHash
CryptDeriveKey
shell32
ShellExecuteA
DragQueryFileA
ole32
CoCreateInstance
CoInitialize
CreateStreamOnHGlobal
oleaut32
OleLoadPicture
VariantInit
VariantClear
userenv
GetGPOListA
GetAppliedGPOListA
crypt32
CryptHashPublicKeyInfo
CertOpenStore
CertCreateCertificateContext
CryptMsgDuplicate
CryptMsgCountersignEncoded
shlwapi
StrToIntExA
wintrust
WinVerifyTrust
WTHelperProvDataFromStateData
Sections
.text Size: 100KB - Virtual size: 100KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 66KB - Virtual size: 66KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data1 Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.trace Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 331KB - Virtual size: 331KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ