Static task
static1
Behavioral task
behavioral1
Sample
0780d52ea6d3635d7f4a740aebacef02.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0780d52ea6d3635d7f4a740aebacef02.exe
Resource
win10v2004-20231222-en
General
-
Target
0780d52ea6d3635d7f4a740aebacef02
-
Size
52KB
-
MD5
0780d52ea6d3635d7f4a740aebacef02
-
SHA1
bd74d8689db24055620efd8d667c80a3608aa425
-
SHA256
ff577707b61fde7df4554fe8ca654c82e13d24a45e3b55cd5c6484afb44b1fa1
-
SHA512
63391b4fbb190ff57b297504062796c5818b8f5e686be673aa55770a44a98c83554bed2a185abc0993226caea7ff3cc328fbb8c922e2b8e581cd0c3c3f02927c
-
SSDEEP
768:7Y+kxV8fjX5Jq5tDaiwKzYBe76K1TyATwqtoQykeuH8:7oxV8LX5JUUiwKzP76PeoQyUc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0780d52ea6d3635d7f4a740aebacef02
Files
-
0780d52ea6d3635d7f4a740aebacef02.exe windows:4 windows x86 arch:x86
25a3d881a966a66163fb1d79bacbc7fb
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
wininet
InternetGetConnectedState
InternetOpenA
InternetOpenUrlA
HttpQueryInfoW
InternetReadFile
InternetCloseHandle
netapi32
Netbios
comctl32
_TrackMouseEvent
ord17
kernel32
GlobalLock
GlobalAlloc
_lclose
_lread
GlobalFree
_lopen
_lwrite
_llseek
_lcreat
lstrcpyW
CreateProcessA
FreeLibrary
GetLogicalDriveStringsA
GetLogicalDriveStringsW
GetProcAddress
GlobalUnlock
SetCurrentDirectoryA
FindFirstFileA
WideCharToMultiByte
lstrlenW
MultiByteToWideChar
GetWindowsDirectoryA
GetSystemDirectoryA
WaitForSingleObject
LoadLibraryW
DeleteFileA
GetSystemTime
GetShortPathNameA
GetStringTypeA
GetStringTypeW
CreateMutexW
GetLastError
LCMapStringW
LCMapStringA
LoadLibraryA
FindClose
FindNextFileA
GetDriveTypeA
HeapAlloc
GetACP
GetCPInfo
WriteFile
RtlUnwind
HeapFree
VirtualFree
HeapCreate
HeapDestroy
GetFileType
GetStdHandle
SetHandleCount
GetOEMCP
VirtualAlloc
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
HeapReAlloc
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
ExitProcess
GetVersion
GetCommandLineA
GetStartupInfoA
GetModuleHandleA
CreateDirectoryA
GetModuleFileNameA
user32
GetFocus
SetClipboardData
EmptyClipboard
OpenClipboard
IsWindowEnabled
GetWindowTextW
CloseClipboard
SendDlgItemMessageA
SendDlgItemMessageW
GetClipboardData
CreateWindowExW
GetWindowLongW
SetWindowLongW
UpdateWindow
GetMessageW
PostMessageW
DispatchMessageW
TranslateMessage
SendMessageW
EndDialog
IsWindow
GetWindowRect
SetWindowPos
LoadMenuW
InsertMenuA
GetSubMenu
ClientToScreen
TrackPopupMenu
DestroyMenu
ShowWindow
FindWindowW
SetTimer
SetFocus
BeginPaint
KillTimer
GetWindowTextA
wsprintfA
InvalidateRect
EnumWindows
GetActiveWindow
SetWindowTextA
MoveWindow
GetSystemMetrics
DialogBoxParamA
DefWindowProcW
LoadCursorW
RegisterClassW
PostQuitMessage
EndPaint
SetRect
gdi32
GetStockObject
MoveToEx
SelectObject
DeleteDC
StretchBlt
DeleteObject
CreateCompatibleDC
CreateDIBitmap
LineTo
advapi32
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
shell32
ShellExecuteA
Sections
.text Size: 32KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ