Static task
static1
Behavioral task
behavioral1
Sample
f78ac464d5a02ddb11ec12c13d5dd7db.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
f78ac464d5a02ddb11ec12c13d5dd7db.exe
Resource
win10v2004-20231215-en
General
-
Target
f78ac464d5a02ddb11ec12c13d5dd7db
-
Size
113KB
-
MD5
f78ac464d5a02ddb11ec12c13d5dd7db
-
SHA1
5bf6a5f96dddb3db609237f7822bc1f91213a460
-
SHA256
cb707dd6918e2e089014582bb7c0374eb1e12e923d0b28e0c6cc8a6574cd45ed
-
SHA512
fcdc08e19b4294ee44abca7c3a29b4620354a3cf546f7190b1bab32789a9e5e7d3de6ab5be4e152967882f9fad5daeb9ef7960a4b087660809a0aa52152c4a0b
-
SSDEEP
1536:itXM2U7PXDMFM9mh/1WK3LEEgohXSXABpoWSZneT6TqKQ7UCWJbLHuI:it8fmM9ml1W6IgCXABy9a6T1JbLl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f78ac464d5a02ddb11ec12c13d5dd7db
Files
-
f78ac464d5a02ddb11ec12c13d5dd7db.exe windows:4 windows x86 arch:x86
2bba4c8b14c5343d093f27c08cd70f87
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
ClientToScreen
EndDeferWindowPos
GetMenuState
GetClientRect
GetDesktopWindow
DefFrameProcA
DrawIcon
SetTimer
CreatePopupMenu
GetPropA
BeginPaint
GetMenuItemID
BeginDeferWindowPos
GetDCEx
CharToOemA
RegisterClassA
GetMenu
CreateIcon
SystemParametersInfoA
DispatchMessageA
GetLastActivePopup
FindWindowA
GetFocus
SetCursor
GetCursor
SetWindowPos
IsWindowEnabled
EnableMenuItem
GetParent
EnumWindows
CheckMenuItem
EnableScrollBar
GetWindow
GetCapture
CallWindowProcA
DispatchMessageW
DrawIconEx
FillRect
GetMenuItemCount
GetActiveWindow
GetClassInfoA
SetWindowTextA
CharNextA
GetCursorPos
CreateMenu
GetClassLongA
TrackPopupMenu
CharLowerBuffA
CallNextHookEx
GetSubMenu
EqualRect
GetWindowTextA
GetClipboardData
IsDialogMessageA
GetMenuItemInfoA
EnableWindow
IsChild
GetSysColor
DefWindowProcA
DrawMenuBar
EnumChildWindows
CharLowerA
msvcrt
memcpy
log10
gdi32
BitBlt
CreateDIBSection
GetRgnBox
CreateCompatibleBitmap
GetDCOrgEx
SetBkMode
CreatePalette
kernel32
ExitThread
FindFirstFileA
lstrcmpiA
GetOEMCP
CloseHandle
ExitProcess
MoveFileA
GetFullPathNameA
lstrcpynA
GetVersionExA
FindResourceA
HeapFree
ResetEvent
WriteFile
EnumCalendarInfoA
GetDiskFreeSpaceA
Sleep
GetModuleHandleA
SetEvent
GetCurrentProcessId
InitializeCriticalSection
GetDateFormatA
GetProcessHeap
GetCPInfo
SetHandleCount
LoadResource
WideCharToMultiByte
MulDiv
FreeResource
LockResource
GetCurrentProcess
GlobalDeleteAtom
GetStartupInfoA
LoadLibraryA
FreeLibrary
LocalAlloc
FindClose
GlobalFindAtomA
LocalReAlloc
DeleteCriticalSection
GetLastError
GetCurrentThreadId
GetStdHandle
SetFilePointer
lstrlenA
GetVersion
GetFileAttributesA
EnterCriticalSection
CreateThread
FormatMessageA
GetLocaleInfoA
RaiseException
MoveFileExA
GetProcAddress
VirtualAlloc
LoadLibraryExA
lstrcatA
GetLocalTime
lstrcpyA
HeapDestroy
VirtualQuery
WaitForSingleObject
CreateEventA
VirtualAllocEx
GetCommandLineA
GetStringTypeW
GlobalAlloc
SetLastError
Sections
CODE Size: 57KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
BSS Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 51KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ