Static task
static1
Behavioral task
behavioral1
Sample
f77daa5576d67423f16b38dc0545daed.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
f77daa5576d67423f16b38dc0545daed.exe
Resource
win10v2004-20231215-en
General
-
Target
f77daa5576d67423f16b38dc0545daed
-
Size
92KB
-
MD5
f77daa5576d67423f16b38dc0545daed
-
SHA1
7a0426443efc9d075c1932ebb1afdc8fba45b39d
-
SHA256
8a5298c169afc4b69a917dfd398d381c86c402a6af0a64f4662f67e6ab49c239
-
SHA512
e8f36250c2b4540ddfa97757289478fd70677b1742ca2058a2c4f797d2ad689ef392da57cc32348f920cca905dc9404a46fd41892e68fae901fccd8016a591fa
-
SSDEEP
1536:mCRTI5knyKiPobflGpJqc+rrfECq5x9eJppMjr4:mCRE5knOJq9r7ECqhUppMjr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f77daa5576d67423f16b38dc0545daed
Files
-
f77daa5576d67423f16b38dc0545daed.exe windows:4 windows x86 arch:x86
7d3b499eabb15a117ab32b0823986224
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
GetSystemDirectoryA
GetLocalTime
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GetTickCount
GetStartupInfoA
CreatePipe
DisconnectNamedPipe
FindNextFileA
PeekNamedPipe
WaitForMultipleObjects
GetSystemInfo
OpenEventA
LocalSize
OpenProcess
Process32Next
Process32First
CreateToolhelp32Snapshot
lstrcmpiA
GetCurrentThreadId
GetModuleHandleA
GetCurrentProcess
GetModuleFileNameA
LocalFree
FindClose
GetLogicalDriveStringsA
WriteFile
GetDiskFreeSpaceExA
GetDriveTypeA
CreateProcessA
GetFileAttributesA
CreateDirectoryA
GetLastError
DeleteFileA
GetVersionExA
GetPrivateProfileStringA
lstrcmpA
WideCharToMultiByte
MultiByteToWideChar
FreeLibrary
GetWindowsDirectoryA
lstrcatA
GetPrivateProfileSectionNamesA
lstrlenA
CancelIo
InterlockedExchange
lstrcpyA
ResetEvent
GetProcAddress
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
InitializeCriticalSection
Sleep
CreateThread
SetEvent
WaitForSingleObject
TerminateThread
CloseHandle
LoadLibraryA
CreateEventA
SetFilePointer
ReadFile
CreateFileA
GetFileSize
RemoveDirectoryA
LocalAlloc
FindFirstFileA
GetVolumeInformationA
LocalReAlloc
TerminateProcess
user32
SetCursorPos
mouse_event
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
GetClipboardData
LoadCursorA
SendMessageA
SystemParametersInfoA
ReleaseDC
WindowFromPoint
MapVirtualKeyA
SetRect
GetCursorPos
SetProcessWindowStation
OpenWindowStationA
GetProcessWindowStation
ExitWindowsEx
GetWindowThreadProcessId
IsWindowVisible
EnumWindows
CloseDesktop
SetThreadDesktop
GetDC
SetCapture
IsWindow
GetKeyState
GetAsyncKeyState
GetForegroundWindow
GetWindowTextA
CharNextA
GetDesktopWindow
wsprintfA
CloseWindow
CreateWindowExA
PostMessageA
OpenDesktopA
GetThreadDesktop
GetUserObjectInformationA
OpenInputDesktop
gdi32
BitBlt
CreateDIBSection
GetDIBits
DeleteObject
DeleteDC
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
advapi32
LookupAccountNameA
LsaClose
LsaRetrievePrivateData
LsaOpenPolicy
LsaFreeMemory
RegCloseKey
RegQueryValueA
RegOpenKeyExA
RegSetValueExA
RegQueryValueExA
RegOpenKeyA
RegCreateKeyExA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegEnumKeyExA
RegEnumValueA
RegDeleteKeyA
RegDeleteValueA
LookupAccountSidA
GetTokenInformation
IsValidSid
shell32
SHGetSpecialFolderPathA
SHGetFileInfoA
msvcrt
_acmdln
_strnicmp
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
exit
_XcptFilter
_exit
??1type_info@@UAE@XZ
calloc
_beginthreadex
strncat
_errno
atoi
strncmp
strcat
rename
strrchr
_except_handler3
free
strcmp
malloc
strchr
strcpy
memcmp
strstr
strlen
memset
??2@YAPAXI@Z
__CxxFrameHandler
_CxxThrowException
??3@YAXPAX@Z
memcpy
memmove
ceil
_ftol
ws2_32
sendto
recvfrom
__WSAFDIsSet
WSACleanup
setsockopt
WSAStartup
listen
accept
getpeername
bind
getsockname
inet_addr
inet_ntoa
send
select
recv
ntohs
closesocket
socket
gethostbyname
htons
gethostname
connect
msvcp60
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
avicap32
capGetDriverDescriptionA
capCreateCaptureWindowA
msvfw32
ICSeqCompressFrameEnd
ICSendMessage
psapi
EnumProcessModules
GetModuleFileNameExA
wtsapi32
WTSFreeMemory
WTSQuerySessionInformationA
Sections
.text Size: 73KB - Virtual size: 75KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
LLLK Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ