Static task
static1
Behavioral task
behavioral1
Sample
57267b607c494f0eda2845337c3c7127.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
57267b607c494f0eda2845337c3c7127.exe
Resource
win10v2004-20231222-en
General
-
Target
57267b607c494f0eda2845337c3c7127
-
Size
406KB
-
MD5
57267b607c494f0eda2845337c3c7127
-
SHA1
5e36f9f6a789555d454928ff1f664bb2b0f09134
-
SHA256
de91cba2ea038d19646d6a726ca7b385512e65de6ba4b79b22bec7a47d8044fa
-
SHA512
990778514ce68abb2ac74b572859e60140648722b894996c236f6bbef2b707801a965a65f01db20e011a2a3ba1d12ec3569a8a4c0ac402bc7d0506e0ecf0dffd
-
SSDEEP
12288:v4DyHQvssGirl0Ed6lFpxyhIUpd0tuyDWuvZZsDpbs4Wgh9mTTVX+9wVYYLVnj7H:v0yH0RMFqXpd0tuUWuvZZsDpbs4Wgh92
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 57267b607c494f0eda2845337c3c7127
Files
-
57267b607c494f0eda2845337c3c7127.exe windows:4 windows x86 arch:x86
c88187a1d2d66317992627e6e21bb606
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
IsDlgButtonChecked
DestroyWindow
DrawFocusRect
RegisterClassA
DrawMenuBar
SetUserObjectInformationW
FrameRect
AppendMenuW
SendNotifyMessageW
GetUserObjectInformationA
ValidateRgn
VkKeyScanA
SetClipboardViewer
IsCharAlphaW
CreateWindowExW
DdeSetUserHandle
RealChildWindowFromPoint
GetCursorInfo
CharUpperW
EnableWindow
DefWindowProcW
KillTimer
LoadImageW
CharUpperBuffW
MessageBoxW
RegisterClassExA
MonitorFromRect
CreateDialogIndirectParamW
BlockInput
CallMsgFilterA
EnableMenuItem
CharUpperA
UnhookWinEvent
OemToCharA
GetScrollRange
GetClassInfoA
GetWindowTextLengthW
ShowWindow
DdeCmpStringHandles
EndDeferWindowPos
kernel32
GetStdHandle
GetEnvironmentStringsW
HeapAlloc
QueryPerformanceCounter
GetSystemInfo
UnhandledExceptionFilter
FlushViewOfFile
DeleteCriticalSection
LeaveCriticalSection
TlsSetValue
VirtualQuery
HeapReAlloc
CreatePipe
HeapSize
SetFilePointer
InterlockedExchange
GetCPInfo
IsValidLocale
MultiByteToWideChar
CloseHandle
SetLastError
GetCurrentThreadId
GetCurrentProcessId
ReadFile
GetVersionExA
GetModuleFileNameA
TlsGetValue
VirtualProtect
GetModuleFileNameW
EnterCriticalSection
SetHandleCount
GetModuleHandleA
LCMapStringA
GetCommandLineA
CompareStringW
CreateMutexA
WideCharToMultiByte
LoadLibraryA
GetLocaleInfoW
SetEnvironmentVariableA
GetLocaleInfoA
GetUserDefaultLCID
TerminateProcess
VirtualFree
GetStringTypeW
OpenMutexA
GetStartupInfoA
GetEnvironmentStrings
CompareStringA
HeapCreate
LCMapStringW
FlushFileBuffers
FreeEnvironmentStringsA
VirtualAlloc
HeapFree
GetOEMCP
EnumSystemLocalesA
GetCommandLineW
WriteFile
RtlUnwind
IsBadWritePtr
GetSystemTimeAsFileTime
GetPrivateProfileIntA
GetCurrentThread
TlsAlloc
InitializeCriticalSection
GetTickCount
GetStartupInfoW
GetLastError
GetFileType
FreeEnvironmentStringsW
GlobalLock
GetDateFormatA
ExitProcess
GetCurrentProcess
GetStringTypeA
SetStdHandle
TlsFree
HeapDestroy
GetACP
GetProcAddress
GetTimeFormatA
GetTimeZoneInformation
IsValidCodePage
comctl32
CreateMappedBitmap
ImageList_Duplicate
ImageList_Remove
InitCommonControlsEx
DestroyPropertySheetPage
CreateStatusWindow
ImageList_BeginDrag
CreateToolbar
Sections
.text Size: 177KB - Virtual size: 177KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 66KB - Virtual size: 65KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 96KB - Virtual size: 115KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 66KB - Virtual size: 65KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ