Static task
static1
Behavioral task
behavioral1
Sample
067f479ca5c5039d7beddf8b6e33941b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
067f479ca5c5039d7beddf8b6e33941b.exe
Resource
win10v2004-20231215-en
General
-
Target
067f479ca5c5039d7beddf8b6e33941b
-
Size
168KB
-
MD5
067f479ca5c5039d7beddf8b6e33941b
-
SHA1
aa89a37c8db3af904485d07720ff3b5698bb6364
-
SHA256
a6d00fadabe506145879f72bdffbe85c43d4a74ffd664ada15f67fb958c68d0a
-
SHA512
12d3c8c465e3224e27f22ce7d21335df4ddcb702202aaae62ccc5a7f6430a34b304e441dcae510f3bc8c7b224c71bbcd6343c10867094e84bdef212accd71c0a
-
SSDEEP
3072:9+tgPXSpq5wBRxbnXgeFB8yL6QOIIEK5ZO8reLvMS:Z+q2BRNHX8yeQOIIV5BreLf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 067f479ca5c5039d7beddf8b6e33941b
Files
-
067f479ca5c5039d7beddf8b6e33941b.exe windows:4 windows x86 arch:x86
575a74be2d74ceedecca1e15889917ab
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
oleaut32
SysReAllocStringLen
SafeArrayGetUBound
SafeArrayGetElement
GetErrorInfo
VariantChangeType
SafeArrayPtrOfIndex
advapi32
RegEnumKeyExA
gdi32
CreateBitmap
SetBkColor
GetPaletteEntries
CreateFontIndirectA
CreateCompatibleDC
GetClipBox
BitBlt
GetPixel
SaveDC
shell32
DragQueryFileA
SHGetDiskFreeSpaceA
kernel32
lstrlenA
LoadLibraryExA
ReadFile
LoadLibraryA
GetLastError
MoveFileExA
GetModuleHandleA
GetDiskFreeSpaceA
ExitThread
SetThreadLocale
VirtualAlloc
GlobalAddAtomA
GetProcAddress
comctl32
ImageList_Create
ImageList_Write
ImageList_Add
ImageList_GetBkColor
ImageList_DrawEx
ImageList_Remove
ImageList_Destroy
ImageList_Read
ImageList_Draw
version
GetFileVersionInfoA
VerQueryValueA
msvcrt
log10
calloc
memcmp
memmove
user32
CharNextA
GetDC
GetScrollPos
DefMDIChildProcA
DispatchMessageW
DrawFrameControl
GetMenuStringA
TranslateMessage
GetMessagePos
LoadCursorA
DeleteMenu
SetWindowLongA
ShowScrollBar
EnumThreadWindows
EqualRect
CharLowerBuffA
MessageBoxA
WindowFromPoint
EnumChildWindows
FrameRect
MessageBeep
InvalidateRect
SetRect
IsWindowVisible
CreateWindowExA
GetSubMenu
GetSystemMetrics
OffsetRect
ReleaseCapture
PeekMessageW
SetWindowsHookExA
SetScrollPos
GetScrollRange
DestroyMenu
GetWindowThreadProcessId
ActivateKeyboardLayout
IsWindowUnicode
RedrawWindow
CreateMenu
IsDialogMessageW
GetClassNameA
GetPropA
GetDesktopWindow
PostMessageA
GetIconInfo
SetWindowTextA
IsWindowEnabled
RegisterClassA
GetDCEx
SetPropA
GetWindow
InsertMenuA
GetActiveWindow
ClientToScreen
CharToOemA
RemovePropA
ScrollWindow
GetWindowDC
EndPaint
GetWindowLongW
GetMenuState
SetClassLongA
KillTimer
SetFocus
EnableWindow
SetScrollRange
GetKeyboardLayoutList
GetForegroundWindow
SetScrollInfo
GetScrollInfo
GetCapture
GetWindowRect
SetTimer
DefFrameProcA
TranslateMDISysAccel
GetKeyboardType
DrawMenuBar
GetSystemMenu
DestroyIcon
UnregisterClassA
AdjustWindowRectEx
RemoveMenu
MsgWaitForMultipleObjects
DrawAnimatedRects
SetMenu
PeekMessageA
GetCursor
WaitMessage
MapVirtualKeyA
CharLowerA
ScreenToClient
CreateIcon
GetClipboardData
LoadBitmapA
EnableScrollBar
GetTopWindow
EnumWindows
GetSysColor
GetMenuItemCount
FillRect
GetWindowLongA
OpenClipboard
DispatchMessageA
PostQuitMessage
GetMenuItemID
IsZoomed
GetKeyboardLayoutNameA
SetActiveWindow
DrawTextA
GetParent
CallNextHookEx
GetKeyNameTextA
IsWindow
SetParent
shlwapi
SHDeleteKeyA
SHDeleteValueA
SHQueryInfoKeyA
SHStrDupA
PathGetCharTypeA
SHQueryValueExA
PathIsContentTypeA
ole32
CoCreateFreeThreadedMarshaler
CoGetContextToken
CoFreeUnusedLibraries
CoGetMalloc
comdlg32
GetFileTitleA
ChooseColorA
Sections
.text Size: 31KB - Virtual size: 30KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 512B - Virtual size: 120KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 132KB - Virtual size: 131KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1024B - Virtual size: 815B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ