Static task
static1
Behavioral task
behavioral1
Sample
756c0ad0361de1fd4883677134680513.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
756c0ad0361de1fd4883677134680513.exe
Resource
win10v2004-20231215-en
General
-
Target
756c0ad0361de1fd4883677134680513
-
Size
150KB
-
MD5
756c0ad0361de1fd4883677134680513
-
SHA1
3733ba525180868b64b4145fa33de593e133ae00
-
SHA256
96a4040f9a1e881ae3e63464df48d06144558f68d07da6557622160f73bfe9ce
-
SHA512
876bc45f3044d1790c185b92bf4cd342cd358de8310589c27ce1dbe399bcb457d129e3e83e8e8b4418b589b64758eafd1b22f657622f6dd9639cf12fa4833947
-
SSDEEP
3072:B2bjA1BsWQ6dkOeN0xFRShUv/8fqolNaGHCdqU:ByA1Bs0pxFsa8fqYaGid
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 756c0ad0361de1fd4883677134680513
Files
-
756c0ad0361de1fd4883677134680513.exe windows:5 windows x86 arch:x86
47a7efdeeb0bee1a559c86a2226fe6a0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetFileTime
SetHandleCount
GetStringTypeW
RemoveDirectoryA
HeapFree
InterlockedExchange
GetCurrentDirectoryA
GetModuleFileNameA
FormatMessageA
GlobalFree
DuplicateHandle
lstrcatA
WriteConsoleW
LockResource
LoadLibraryW
GetOEMCP
GetCommandLineA
LocalLock
GetCPInfo
MulDiv
GetFileTime
SetPriorityClass
GetCurrentThread
LocalReAlloc
FileTimeToSystemTime
lstrcmpW
GetModuleFileNameW
LocalFree
CompareStringW
CreateEventA
SystemTimeToFileTime
SetFileAttributesA
HeapAlloc
SetCurrentDirectoryA
GetProfileIntA
ConvertDefaultLocale
QueryPerformanceFrequency
ResetEvent
LoadLibraryExA
GetShortPathNameA
MultiByteToWideChar
GetFileInformationByHandle
GetCurrentProcess
CreateProcessA
InterlockedIncrement
GetCurrentDirectoryW
UnlockFile
FlushFileBuffers
TlsAlloc
RtlUnwind
FindFirstChangeNotificationA
FileTimeToDosDateTime
GlobalUnlock
SearchPathA
SetFilePointer
CreateDirectoryA
GlobalReAlloc
DeleteCriticalSection
IsValidCodePage
FindResourceExA
GetPrivateProfileIntA
GetVersionExA
CompareStringA
EnumResourceLanguagesA
LCMapStringW
SetEvent
GlobalFlags
GetModuleHandleW
GetSystemDefaultUILanguage
lstrcmpiA
GetStdHandle
GetFileSizeEx
Sleep
FreeLibrary
HeapCreate
LocalAlloc
SuspendThread
OpenFile
ExpandEnvironmentStringsA
WinExec
GetPrivateProfileStringA
GetSystemTimeAsFileTime
CompareFileTime
HeapQueryInformation
FileTimeToLocalFileTime
CreateFileMappingA
LocalFileTimeToFileTime
GetACP
GetFileType
GetTempFileNameA
SetEndOfFile
GetVolumeInformationA
DosDateTimeToFileTime
InitializeCriticalSectionAndSpinCount
TlsFree
GetSystemDirectoryW
InterlockedDecrement
GetFileAttributesExA
ResumeThread
FindCloseChangeNotification
WriteFile
WritePrivateProfileStringA
GetConsoleCP
GetDriveTypeA
CreateFileW
GetDriveTypeW
lstrcpyA
FreeEnvironmentStringsW
SetUnhandledExceptionFilter
TlsSetValue
TlsGetValue
FreeResource
GlobalAddAtomA
GlobalLock
GlobalDeleteAtom
lstrcpynA
CreateFileA
MoveFileA
UnhandledExceptionFilter
FindResourceA
GetFullPathNameA
GetWindowsDirectoryA
IsDebuggerPresent
FindNextChangeNotification
HeapSize
GetLastError
CloseHandle
GetUserDefaultLangID
MapViewOfFile
QueryPerformanceCounter
HeapSetInformation
GetStartupInfoW
LeaveCriticalSection
GetTimeZoneInformation
GetProcAddress
lstrlenA
SetThreadPriority
FindResourceExW
GetNumberFormatA
SetStdHandle
GlobalHandle
InitializeCriticalSection
CreateThread
WideCharToMultiByte
GetDiskFreeSpaceA
GetLocalTime
lstrlenW
LocalUnlock
GlobalGetAtomNameA
EnterCriticalSection
SetErrorMode
GetLocaleInfoA
RaiseException
SizeofResource
GetStringTypeExA
GetEnvironmentStringsW
GetSystemInfo
TerminateProcess
GetConsoleMode
LockFile
GetThreadLocale
GetFileAttributesA
GlobalSize
IsProcessorFeaturePresent
SetLastError
lstrcmpA
GetUserDefaultUILanguage
DeleteFileA
LoadResource
GetCurrentThreadId
SetEnvironmentVariableA
CopyFileA
GetProcessHeap
WaitForSingleObject
GetFileSize
GetTempPathA
LoadLibraryA
FindResourceW
WaitForMultipleObjects
VirtualProtect
GetModuleHandleA
FindAtomA
GlobalFindAtomA
GetTickCount
GetCurrentProcessId
user32
DispatchMessageW
MessageBeep
GetMenuItemCount
PostQuitMessage
GetMenuItemInfoW
CreatePopupMenu
GetFocus
GetWindowThreadProcessId
GetCursorPos
KillTimer
GetMonitorInfoW
TranslateMessage
GetWindow
LoadStringW
DestroyCursor
IsWindow
SendMessageW
SetWindowTextW
GetClassNameW
TranslateAcceleratorW
CharNextW
SetCursor
LoadImageW
SetTimer
LoadCursorW
CallWindowProcW
SetWindowPos
PtInRect
ScreenToClient
SetFocus
InvalidateRect
GetWindowLongW
SetWindowLongW
GetClientRect
GetParent
UnregisterClassA
PeekMessageW
TrackPopupMenuEx
MapWindowPoints
AppendMenuW
GetMessageW
MonitorFromPoint
ReleaseDC
EnumWindows
DestroyWindow
LoadStringA
LoadIconA
IsWindowEnabled
CharLowerW
GetKeyboardLayout
IsWindowVisible
EnableWindow
DrawTextW
EnumChildWindows
MonitorFromWindow
PostMessageW
GetWindowTextW
DefWindowProcW
UpdateLayeredWindow
DestroyMenu
LoadMenuW
TrackMouseEvent
GetWindowRect
RemoveMenu
ShowWindow
GetWindowDC
gdi32
BeginPath
AnimatePalette
CheckColorsInGamut
advapi32
StartServiceCtrlDispatcherW
RevertToSelf
BuildExplicitAccessWithNameW
RegisterEventSourceW
StartServiceW
RegOpenKeyA
SetServiceStatus
RegQueryValueExW
RegCloseKey
ReportEventW
QueryServiceStatusEx
CreateProcessAsUserW
ControlService
DeleteService
RegCreateKeyExW
RegCreateKeyW
GetNamedSecurityInfoW
OpenServiceW
GetTokenInformation
OpenSCManagerW
SetNamedSecurityInfoW
DeregisterEventSource
SetEntriesInAclW
RegSetValueExW
CloseServiceHandle
ChangeServiceConfigW
RegisterServiceCtrlHandlerExW
OpenProcessToken
RegOpenKeyExW
DuplicateTokenEx
CreateServiceW
EnumDependentServicesW
RegEnumKeyW
SetTokenInformation
shell32
SHGetSpecialFolderPathW
SHEmptyRecycleBinW
ole32
CoInitialize
shlwapi
PathFindFileNameW
PathFileExistsW
PathAppendW
PathQuoteSpacesW
PathCombineW
PathRemoveFileSpecW
StrStrIW
version
VerQueryValueW
oledlg
OleUIBusyW
ord8
wtsapi32
WTSEnumerateSessionsW
WTSFreeMemory
psapi
GetModuleFileNameExW
GetModuleInformation
msvcrt
_CIsin
_CIcos
exit
_except_handler3
free
malloc
__set_app_type
Sections
.text Size: 67KB - Virtual size: 67KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data5 Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 26KB - Virtual size: 69KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ