Static task
static1
Behavioral task
behavioral1
Sample
75d6cd90cc40269841d75ccbf8a343c8.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
75d6cd90cc40269841d75ccbf8a343c8.exe
Resource
win10v2004-20231222-en
General
-
Target
75d6cd90cc40269841d75ccbf8a343c8
-
Size
118KB
-
MD5
75d6cd90cc40269841d75ccbf8a343c8
-
SHA1
810818696ff96725b24f1c578ecd4b96ae246e4a
-
SHA256
18c20c860f0443d24029cccdff1ad8b9b0b43c66b981f00ebe4902416fc6d7c1
-
SHA512
63d0ed4d7c74596a3316e45d3c75bb3cc10f3b02828eacaf468a3fe33fe6ed82c6ef2bb363d08fb1d73c1ae3199bcda61ac4137b2e66feeea96817c7eb2e1eb5
-
SSDEEP
3072:5SW+6f2kvjCeiLR1AEB73lL08S0frwH4:5gWvjCeiLDfB73108SQrA4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 75d6cd90cc40269841d75ccbf8a343c8
Files
-
75d6cd90cc40269841d75ccbf8a343c8.exe windows:4 windows x86 arch:x86
ec444d304d8047646af6c59929b120c0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
kernel32
GetCurrentThreadId
GetLastError
ExitProcess
CreateThread
WriteFile
UnhandledExceptionFilter
SetFilePointer
SetEndOfFile
RtlUnwind
ReadFile
RaiseException
GetStdHandle
GetFileSize
GetSystemTime
GetFileType
CreateFileA
CloseHandle
GetCommandLineA
TlsSetValue
TlsGetValue
LocalAlloc
GetModuleHandleA
GetModuleFileNameA
FreeLibrary
HeapFree
HeapReAlloc
HeapAlloc
GetProcessHeap
lstrcmpiA
WriteFile
WaitForSingleObject
TerminateThread
TerminateProcess
SuspendThread
Sleep
SetProcessWorkingSetSize
SetPriorityClass
SetLocalTime
SetFileTime
SetFileAttributesA
SetErrorMode
ResumeThread
RemoveDirectoryA
ReadFile
OpenProcess
MoveFileA
LoadLibraryA
GlobalUnlock
GlobalLock
GlobalAlloc
GetWindowsDirectoryA
GetVersionExA
GetTimeFormatA
GetTempPathA
GetSystemDirectoryA
GetProcAddress
GetModuleHandleA
GetLogicalDrives
GetFileTime
GetFileSize
GetFileAttributesA
GetEnvironmentVariableA
GetDriveTypeA
GetDateFormatA
GetCurrentProcessId
GetCurrentProcess
GetComputerNameA
FreeLibrary
FindNextFileA
FindFirstFileA
FindClose
ExitProcess
DeviceIoControl
DeleteFileA
CreateProcessA
CreateFileA
CreateDirectoryA
CopyFileA
CloseHandle
user32
CharNextA
mouse_event
TranslateMessage
SystemParametersInfoA
SwapMouseButton
ShowWindow
SetWindowTextA
SetWindowPos
SetWindowLongA
SetFocus
SetCursorPos
SetClipboardData
SendMessageA
RegisterClassA
OpenClipboard
MessageBoxA
LoadIconA
LoadCursorA
IsWindowVisible
IsIconic
GetWindowThreadProcessId
GetWindowTextLengthA
GetWindowTextA
GetWindowLongA
GetSystemMetrics
GetMessageA
GetKeyState
GetForegroundWindow
GetDesktopWindow
GetCursorPos
GetClipboardData
GetClassNameA
GetAsyncKeyState
FindWindowExA
FindWindowA
ExitWindowsEx
EnumWindows
EndPaint
EnableWindow
EmptyClipboard
DispatchMessageA
DestroyWindow
DefWindowProcA
CreateWindowExA
CloseClipboard
ClipCursor
CallWindowProcA
BeginPaint
wsprintfA
oleaut32
SysFreeString
SysReAllocStringLen
advapi32
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegEnumValueA
RegEnumKeyA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
RegCloseKey
OpenProcessToken
LookupPrivilegeNameA
GetUserNameA
GetTokenInformation
AdjustTokenPrivileges
UnlockServiceDatabase
StartServiceA
OpenServiceA
OpenSCManagerA
LockServiceDatabase
EnumServicesStatusA
DeleteService
ControlService
CloseServiceHandle
ChangeServiceConfigA
gdi32
TextOutA
SetTextColor
SetBkMode
SetBkColor
SelectObject
CreateFontIndirectA
CreateFontA
wininet
InternetOpenUrlA
InternetOpenA
InternetCloseHandle
wsock32
WSACleanup
WSAStartup
WSAAsyncSelect
gethostname
gethostbyname
socket
send
recv
listen
inet_ntoa
inet_addr
htons
htonl
connect
closesocket
bind
accept
shell32
ShellExecuteA
Sections
.text Size: 107KB - Virtual size: 108KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE