Static task
static1
Behavioral task
behavioral1
Sample
754f13a82ae5a8a9d14446743fd12a9a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
754f13a82ae5a8a9d14446743fd12a9a.exe
Resource
win10v2004-20231215-en
General
-
Target
754f13a82ae5a8a9d14446743fd12a9a
-
Size
430KB
-
MD5
754f13a82ae5a8a9d14446743fd12a9a
-
SHA1
5ebaa63a574aa88514cbca2da35acbd1d57b0696
-
SHA256
e7670f1b37f18482803fefce269bfd77eb4b4223d995a7fc1729faefd9a8dfea
-
SHA512
d7f2ce757ca703b30e9b19fb57ec0a8aba51677ed6135295c7a7375359f5c184d8bd872f4a52ebad692082dc6899853f123c87ca808b86cdee1c5fb6df845a9b
-
SSDEEP
12288:A4+1aScMzVMrX1ucv1MquynsfRsQcoDHog55:D+YUzi7bNMquysfRmo7o6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 754f13a82ae5a8a9d14446743fd12a9a
Files
-
754f13a82ae5a8a9d14446743fd12a9a.exe windows:4 windows x86 arch:x86
c9f298d0cc9af246a300d737cdc07b55
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
CryptDestroyHash
CryptVerifySignatureW
ReportEventW
CryptHashData
CryptSetProviderA
CryptDecrypt
RegConnectRegistryW
RegRestoreKeyW
DuplicateTokenEx
user32
LoadCursorFromFileW
SubtractRect
HideCaret
CreateDesktopW
DrawTextW
SetThreadDesktop
AppendMenuW
CharLowerBuffW
CloseClipboard
IsCharUpperA
GetWindowContextHelpId
CharToOemBuffW
WinHelpA
SetScrollPos
DdeInitializeA
DestroyWindow
GetClassNameW
GetKeyboardState
SetDoubleClickTime
DefFrameProcA
UnregisterClassA
kernel32
TerminateProcess
HeapSize
TlsSetValue
CompareStringW
GetStdHandle
CreateDirectoryExW
GetCurrentThreadId
GetCommandLineA
IsValidLocale
TlsGetValue
InterlockedDecrement
EnumResourceLanguagesA
EnterCriticalSection
WideCharToMultiByte
GetSystemTimeAsFileTime
GetLastError
GetCurrentThread
CompareStringA
GetNamedPipeInfo
HeapCreate
GetModuleFileNameW
GetTimeFormatA
GetUserDefaultLCID
GetFileAttributesExA
GetProcAddress
Sleep
VirtualFree
CopyFileExA
UnhandledExceptionFilter
GetTimeZoneInformation
GetStartupInfoW
EnumSystemLocalesA
FreeLibrary
SetConsoleCtrlHandler
FindNextChangeNotification
LoadLibraryA
TlsFree
GetEnvironmentStringsW
lstrcatA
GetTickCount
GetVersionExA
GetCPInfo
GetLocaleInfoW
WriteFile
GetEnvironmentStrings
RtlUnwind
MultiByteToWideChar
DeleteCriticalSection
GetOEMCP
VirtualQuery
HeapReAlloc
SetUnhandledExceptionFilter
SetLastError
GetCurrentDirectoryA
FreeEnvironmentStringsW
GetStringTypeA
InterlockedExchangeAdd
LCMapStringA
QueryPerformanceCounter
GetModuleFileNameA
GlobalUnfix
SetHandleCount
WriteProfileSectionA
lstrlenW
GetCommandLineW
TlsAlloc
GetStartupInfoA
HeapFree
VirtualAlloc
GetCurrentProcessId
InterlockedExchange
LCMapStringW
GetProcessHeap
GetDateFormatA
FreeEnvironmentStringsA
SetEnvironmentVariableA
GetLocaleInfoA
HeapDestroy
GetStringTypeW
IsDebuggerPresent
HeapAlloc
InterlockedIncrement
lstrcpyW
LeaveCriticalSection
GetCurrentProcess
IsValidCodePage
GetACP
GetFileType
GetProfileStringW
InitializeCriticalSection
ExitProcess
GetModuleHandleA
shell32
ExtractIconExA
comdlg32
ChooseColorW
PrintDlgA
gdi32
SelectClipRgn
ExtCreatePen
SetWorldTransform
GetTextExtentPoint32A
Polyline
GetRandomRgn
GetCurrentPositionEx
GdiPlayDCScript
GetTextColor
SetArcDirection
PatBlt
StartDocA
PolylineTo
GetCharacterPlacementA
ResetDCA
SwapBuffers
GetCharWidthW
GetFontLanguageInfo
CopyEnhMetaFileA
GetGlyphOutlineA
GetCharABCWidthsA
Sections
.text Size: 129KB - Virtual size: 128KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 284KB - Virtual size: 283KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ