Static task
static1
Behavioral task
behavioral1
Sample
072e015c0f6bf2a92899be4a4985db00.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
072e015c0f6bf2a92899be4a4985db00.exe
Resource
win10v2004-20231215-en
General
-
Target
072e015c0f6bf2a92899be4a4985db00
-
Size
632KB
-
MD5
072e015c0f6bf2a92899be4a4985db00
-
SHA1
cf187c62667ba29c1bc8c1682d98e656aa9b9770
-
SHA256
0ea9eaac1c4c06dbc29b8db833fa07a35e87433fcc6a7f878b121ff740ff6b58
-
SHA512
fe9ea9538fda7b2e0ea79706f717e64fdf5bcba4e21637d151ef8ed007554fa9cab4490012d7b4da13b4193fdd9c00896fc900d3b8fb8c7f37fad85db1961a9e
-
SSDEEP
12288:hQTScv9QpcnIJZfaIKGGDNlm3E6mx2n0GVpEn0wbfBimmTsxnm:hLcvccesIKGkX9cnsn0wb5iTsxn
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 072e015c0f6bf2a92899be4a4985db00
Files
-
072e015c0f6bf2a92899be4a4985db00.exe windows:4 windows x86 arch:x86
7114fdd7f08dfa0af788f78be58f1a0b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
CryptHashSessionKey
RegEnumValueA
comctl32
ImageList_SetFlags
ImageList_DragShowNolock
ImageList_AddMasked
CreatePropertySheetPageW
DestroyPropertySheetPage
CreatePropertySheetPage
ImageList_GetFlags
ImageList_Destroy
CreateStatusWindowA
ImageList_DragEnter
InitCommonControlsEx
ImageList_GetIconSize
CreateToolbarEx
ImageList_GetImageInfo
comdlg32
GetFileTitleA
GetOpenFileNameW
ChooseColorA
PrintDlgW
gdi32
GetObjectW
StrokeAndFillPath
EnumEnhMetaFile
GetGlyphOutlineA
FlattenPath
DeleteDC
GetDeviceCaps
CreateDCW
CreateHalftonePalette
GetEnhMetaFileDescriptionW
CreatePolygonRgn
EnumICMProfilesW
shell32
DragQueryFileW
user32
GetMenuState
GetMenuBarInfo
GetSystemMetrics
CharUpperBuffW
SetThreadDesktop
OpenWindowStationW
OemToCharBuffW
DdeGetLastError
SetProcessWindowStation
UnhookWindowsHookEx
EnableMenuItem
CallMsgFilter
CreateIconIndirect
SetMenuInfo
CascadeChildWindows
CreateWindowExA
EnumClipboardFormats
CallWindowProcA
DrawIcon
TranslateAcceleratorW
CloseClipboard
SetWindowsHookExA
FlashWindowEx
OemToCharA
GetQueueStatus
GetScrollBarInfo
SetCursorPos
DispatchMessageW
DrawCaption
GetWindowLongW
ChangeDisplaySettingsExA
SetWindowWord
SetKeyboardState
ShowWindow
GetTitleBarInfo
WindowFromDC
EnumDesktopsW
GetWindowModuleFileNameW
ReplyMessage
EnumDisplayDevicesW
DestroyWindow
GetKeyboardLayoutList
RemoveMenu
MessageBoxW
RegisterClassA
GrayStringW
SetUserObjectInformationW
MonitorFromRect
CharUpperA
LockWindowUpdate
RegisterClassExA
GetGuiResources
EnumDesktopsA
DlgDirListW
SetDlgItemTextW
SetActiveWindow
CheckMenuItem
GetTopWindow
DefFrameProcA
DefWindowProcW
GetInputState
CreateMenu
CharNextExA
EndPaint
GetDlgItemTextA
CharLowerBuffA
GetDlgItemTextW
SetWindowPlacement
DrawStateW
GetCursorInfo
GetWindowThreadProcessId
GetUpdateRect
kernel32
WritePrivateProfileStringA
GetModuleFileNameA
HeapReAlloc
GetConsoleOutputCP
SetPriorityClass
WaitForDebugEvent
TlsAlloc
GetUserDefaultLCID
WritePrivateProfileStructA
GetProcAddress
CreateFileMappingA
GetProcessHeap
GetCommandLineA
GetTimeFormatA
QueryPerformanceCounter
ExitProcess
FreeLibraryAndExitThread
GetModuleHandleA
HeapDestroy
VirtualUnlock
IsDebuggerPresent
GetWindowsDirectoryW
GetFileTime
CreateFileA
IsValidCodePage
WriteConsoleA
HeapSize
SetConsoleOutputCP
FlushInstructionCache
ReadConsoleInputW
GetTickCount
GetCurrentProcessId
GetSystemDirectoryA
SetUnhandledExceptionFilter
RtlUnwind
DeleteCriticalSection
lstrlenW
FreeEnvironmentStringsA
WriteConsoleW
SetFilePointer
GetCurrentThread
GetLocaleInfoW
OpenFileMappingW
LockFileEx
FreeEnvironmentStringsW
HeapAlloc
FlushFileBuffers
VirtualQueryEx
HeapFree
SetThreadPriority
SetConsoleCtrlHandler
GetThreadPriority
GetConsoleCursorInfo
OpenMutexA
WideCharToMultiByte
LeaveCriticalSection
GetThreadTimes
MoveFileExW
LoadLibraryA
GetSystemTime
TerminateProcess
ReleaseSemaphore
VirtualFree
FreeLibrary
GetEnvironmentStringsW
SetStdHandle
GetAtomNameW
TlsGetValue
GetSystemTimeAsFileTime
Sleep
InitializeCriticalSection
SetConsoleCP
GetLastError
EnumResourceNamesA
GetStartupInfoA
CreateMutexA
GetStringTypeA
LCMapStringW
GetCurrentDirectoryW
VirtualQuery
CreateMutexW
GetFullPathNameA
SetConsoleMode
TryEnterCriticalSection
GetTimeZoneInformation
CompareStringW
TlsFree
GlobalFix
CompareStringA
WritePrivateProfileSectionW
LCMapStringA
VirtualAlloc
LockResource
RaiseException
OpenProcess
GetStdHandle
SetConsoleWindowInfo
GetVersionExA
LocalReAlloc
SetConsoleCursorPosition
InterlockedIncrement
EnumSystemLocalesA
GetOEMCP
TlsSetValue
GetLocaleInfoA
GetLogicalDrives
HeapCreate
FindAtomW
WriteConsoleOutputAttribute
GetStringTypeW
ReadFile
EnterCriticalSection
VirtualFreeEx
GetCurrentThreadId
InterlockedExchange
GetCurrentProcess
WriteProfileStringA
GetFileType
InterlockedDecrement
GetCPInfo
CloseHandle
GetProcAddress
GetConsoleMode
IsValidLocale
SetEnvironmentVariableA
SetLastError
ReadConsoleOutputAttribute
GetProcessShutdownParameters
UnhandledExceptionFilter
GetConsoleCP
GetEnvironmentStrings
GetACP
UnlockFile
SetVolumeLabelA
WriteFile
SetConsoleTitleW
MultiByteToWideChar
SetHandleCount
GetDateFormatA
Sections
.text Size: 176KB - Virtual size: 172KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 252KB - Virtual size: 250KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 116KB - Virtual size: 124KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 84KB - Virtual size: 83KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ