Static task
static1
Behavioral task
behavioral1
Sample
761149b926d34f41009f22f32dae8f133b004de7bddc84c88ac1556251b59394.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
761149b926d34f41009f22f32dae8f133b004de7bddc84c88ac1556251b59394.exe
Resource
win10v2004-20231215-en
General
-
Target
761149b926d34f41009f22f32dae8f133b004de7bddc84c88ac1556251b59394
-
Size
4.0MB
-
MD5
db7d0f86c28a10185e787342092941b1
-
SHA1
9b7ec36a74a59f1afd955ee74f58b97aacdd3f3b
-
SHA256
761149b926d34f41009f22f32dae8f133b004de7bddc84c88ac1556251b59394
-
SHA512
db61e72d28a6175b04e8257e0186bf09a75650b41495544ba0e90f309326f9b618e7f51670a74c3af5cc29acf1300b71cdf3e0d9dfd00d9dcd56d9b382216b21
-
SSDEEP
12288:1o2PgySffJaLkkQ8Xe3BJMdSNhqdUWd/SABtURz9+cKwzrQcPtqO3E8NluxGjGo7:hIySffQLRexi8qziRzRa4So+pz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 761149b926d34f41009f22f32dae8f133b004de7bddc84c88ac1556251b59394
Files
-
761149b926d34f41009f22f32dae8f133b004de7bddc84c88ac1556251b59394.exe windows:6 windows x86 arch:x86
2ddf7e2572c8fb7d4cc4f7ffd6af7ddf
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
opencv_core310
?deallocate@Mat@cv@@QAEXXZ
?allocate@String@cv@@AAEPADI@Z
?deallocate@String@cv@@AAEXXZ
?zeros@Mat@cv@@SA?AVMatExpr@2@V?$Size_@H@2@H@Z
??0_IplImage@@QAE@ABVMat@cv@@@Z
?fastFree@cv@@YAXPAX@Z
opencv_highgui310
cvGetWindowHandle
?getMouseWheelDelta@cv@@YAHH@Z
cvNamedWindow
?setMouseCallback@cv@@YAXABVString@1@P6AXHHHHPAX@Z1@Z
?imshow@cv@@YAXABVString@1@ABV_InputArray@1@@Z
cvDestroyAllWindows
?waitKey@cv@@YAHH@Z
cvDestroyWindow
opencv_imgproc310
?resize@cv@@YAXABV_InputArray@1@ABV_OutputArray@1@V?$Size_@H@1@NNH@Z
?circle@cv@@YAXABV_InputOutputArray@1@V?$Point_@H@1@HABV?$Scalar_@N@1@HHH@Z
cvLinearPolar
?cvtColor@cv@@YAXABV_InputArray@1@ABV_OutputArray@1@HH@Z
opencv_videoio310
?isOpened@VideoCapture@cv@@UBE_NXZ
??0VideoCapture@cv@@QAE@ABVString@1@@Z
?release@VideoCapture@cv@@UAEXXZ
?read@VideoCapture@cv@@UAE_NABV_OutputArray@2@@Z
?set@VideoCapture@cv@@UAE_NHN@Z
?get@VideoCapture@cv@@UBENH@Z
??1VideoCapture@cv@@UAE@XZ
mfc140u
ord280
ord3009
ord5921
ord285
ord12586
ord9040
ord501
ord1143
ord6225
ord4093
ord286
ord5582
ord5589
ord5626
ord6316
ord2172
ord1526
ord13656
ord14137
ord265
ord13654
ord5850
ord9365
ord5419
ord13293
ord13028
ord4881
ord6533
ord9210
ord10255
ord5790
ord12168
ord3265
ord3371
ord3372
ord3941
ord12124
ord2682
ord5935
ord13703
ord11717
ord6877
ord14596
ord7923
ord14590
ord3055
ord4494
ord9693
ord4502
ord4988
ord4927
ord4912
ord5109
ord5019
ord4942
ord4997
ord5013
ord4954
ord4960
ord4966
ord4948
ord5003
ord4936
ord1777
ord1756
ord1770
ord1744
ord1722
ord12258
ord12262
ord13878
ord3266
ord9235
ord11002
ord6978
ord12173
ord8965
ord14588
ord11936
ord3838
ord12089
ord9139
ord11726
ord11725
ord5652
ord10288
ord10284
ord10286
ord10287
ord10285
ord14785
ord2760
ord8210
ord3302
ord3305
ord13752
ord6218
ord3164
ord3403
ord1523
ord11396
ord12131
ord4225
ord6220
ord13756
ord2761
ord9132
ord12220
ord9256
ord6589
ord11015
ord5422
ord1180
ord9468
ord7509
ord13544
ord7891
ord14657
ord2378
ord12348
ord14604
ord2383
ord12405
ord4856
ord3236
ord6751
ord7109
ord7820
ord2990
ord8464
ord4885
ord10472
ord3697
ord2246
ord2215
ord500
ord7495
ord462
ord266
ord8470
ord8386
ord12865
ord8324
ord5357
ord2486
ord12541
ord12542
ord14589
ord7922
ord14595
ord9398
ord4152
ord4090
ord12947
ord7941
ord2034
ord11982
ord11983
ord14466
ord12531
ord8000
ord14667
ord6348
ord14669
ord6350
ord14668
ord6349
ord3852
ord5918
ord12239
ord12247
ord4589
ord8217
ord10433
ord12251
ord12219
ord12928
ord5249
ord5549
ord5760
ord9350
ord5525
ord5763
ord5252
ord5411
ord5228
ord7722
ord7723
ord7712
ord5409
ord8219
ord10250
ord9209
ord6860
ord1113
ord3404
ord13473
ord6489
ord6566
ord3882
ord296
ord4815
ord2304
ord1111
ord1045
ord1142
ord4092
ord13911
ord7313
ord13442
ord952
ord2205
ord8062
ord13277
ord11038
ord1391
ord7997
ord1472
ord995
ord7653
ord10379
ord1511
ord1513
ord890
ord1002
ord3833
ord2409
ord4974
kernel32
InitializeCriticalSectionEx
GetLastError
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
GetModuleHandleW
GetProcAddress
OutputDebugStringW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
CloseHandle
CreateEventW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
WideCharToMultiByte
user32
GetClientRect
GetSystemMetrics
IsIconic
ReleaseDC
LoadIconW
GetSystemMenu
AppendMenuW
DrawIcon
GetWindowRect
SetWindowPos
SendMessageW
UpdateWindow
EnableWindow
GetParent
GetDC
gdi32
GetStockObject
BitBlt
comctl32
InitCommonControlsEx
ws2_32
send
recv
closesocket
vcruntime140
__CxxFrameHandler3
memcpy
memset
_except_handler4_common
__std_terminate
api-ms-win-crt-stdio-l1-1-0
__p__commode
fclose
fopen
_set_fmode
api-ms-win-crt-string-l1-1-0
strncmp
api-ms-win-crt-utility-l1-1-0
ldiv
api-ms-win-crt-convert-l1-1-0
atoi
api-ms-win-crt-heap-l1-1-0
free
_set_new_mode
api-ms-win-crt-runtime-l1-1-0
_initialize_onexit_table
_register_onexit_function
_crt_atexit
terminate
_controlfp_s
_initterm
_initterm_e
exit
_get_wide_winmain_command_line
_initialize_wide_environment
_exit
_configure_wide_argv
_cexit
_set_app_type
_seh_filter_exe
_register_thread_local_exe_atexit_callback
_c_exit
api-ms-win-crt-math-l1-1-0
_libm_sse2_cos_precise
__setusermatherr
_libm_sse2_sqrt_precise
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
Sections
.text Size: 30KB - Virtual size: 30KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 1.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4.0MB - Virtual size: 4.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ