Static task
static1
Behavioral task
behavioral1
Sample
z74160fr(ricoh sp201N) win10 64bit.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
z74160fr(ricoh sp201N) win10 64bit.exe
Resource
win10v2004-20231215-en
General
-
Target
z74160fr(ricoh sp201N) win10 64bit.exe
-
Size
2.4MB
-
MD5
440aab4ed5c45e8dadd87ff71ea4d91e
-
SHA1
a9a068189f81f0787f7f3b1a7f2e99dd75cbcb43
-
SHA256
3f297b9d5df24a4a99600c75c440b792819df86afb2a34af4c76f4519b056603
-
SHA512
a1de60fc5afe0fe468f7ecbfd91576dd190cc9addc6d262b8b6ee2a75a4c4ae292936c87ed6553503794b5d79618aae60e7dc6dec7aa91d1d55164562b2e1d27
-
SSDEEP
49152:eORdLpuBc/Gu9nzw2Vju5da1q1ObU+ZoextK6WXmZYxX6N:eORdL0HuVzw25WaIAfZDw6QEYQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource z74160fr(ricoh sp201N) win10 64bit.exe
Files
-
z74160fr(ricoh sp201N) win10 64bit.exe.exe windows:4 windows x86 arch:x86
cc3d30310a2c54cf61fa03ce1e77e3de
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
ShellExecuteA
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetMalloc
FindExecutableA
user32
GetSysColor
GetClientRect
SetRect
EndPaint
LoadCursorA
GetLastActivePopup
ShowWindow
PostMessageA
SendMessageA
EnableWindow
GetWindowLongA
SetWindowLongA
SetWindowTextA
SetForegroundWindow
SetActiveWindow
DialogBoxIndirectParamA
GetDlgItemTextA
EndDialog
GetWindowRect
BeginPaint
SetWindowPos
GetKeyState
CharUpperBuffA
SetTimer
KillTimer
SendDlgItemMessageA
UpdateWindow
SetDlgItemTextA
GetDlgItem
InvalidateRect
OemToCharBuffA
PeekMessageA
TranslateMessage
DispatchMessageA
GetParent
MessageBoxA
SetCursor
CharNextA
SetWindowWord
GetWindowWord
DefWindowProcA
RegisterClassA
GetSystemMetrics
kernel32
lstrlenA
SetStdHandle
GetLocaleInfoA
GetSystemInfo
VirtualProtect
VirtualAlloc
GetCPInfo
GetOEMCP
GetACP
LCMapStringW
MultiByteToWideChar
LCMapStringA
HeapSize
HeapAlloc
HeapReAlloc
VirtualQuery
InterlockedExchange
LoadLibraryA
GetStringTypeW
GetStringTypeA
HeapFree
VirtualFree
HeapCreate
HeapDestroy
GetFileType
SetHandleCount
GetEnvironmentStringsW
GetLastError
WideCharToMultiByte
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
FindClose
FindFirstFileA
GetCurrentDirectoryA
CreateDirectoryA
SetFileTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
LocalAlloc
_lopen
GetDriveTypeA
GetEnvironmentVariableA
GlobalFree
GlobalUnlock
GlobalHandle
_lclose
_llseek
_lread
GlobalLock
GlobalAlloc
LocalFree
GlobalMemoryStatus
GetVersion
GetModuleFileNameA
WriteFile
GetSystemTime
ExitProcess
CloseHandle
CreateFileA
SetCurrentDirectoryA
FlushFileBuffers
_lcreat
GetVolumeInformationA
GetWindowsDirectoryA
SetFilePointer
WinExec
_lwrite
lstrcmpiA
SetErrorMode
GetProcAddress
GetModuleHandleA
TerminateProcess
GetCurrentProcess
GetStartupInfoA
GetCommandLineA
GetVersionExA
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
RtlUnwind
GetStdHandle
gdi32
SelectObject
SetTextAlign
SetBkColor
SetTextColor
DeleteObject
GetBkColor
GetTextExtentPoint32A
ExtTextOutA
CreateDCA
GetDeviceCaps
CreateFontIndirectA
DeleteDC
advapi32
RegQueryValueA
comctl32
ord17
Sections
.text Size: 44KB - Virtual size: 41KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_winzip_ Size: 2.3MB - Virtual size: 2.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ