Static task
static1
Behavioral task
behavioral1
Sample
78a5cce2648ad5ec2b864bd46f4d8a09.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
78a5cce2648ad5ec2b864bd46f4d8a09.exe
Resource
win10v2004-20231215-en
General
-
Target
78a5cce2648ad5ec2b864bd46f4d8a09
-
Size
573KB
-
MD5
78a5cce2648ad5ec2b864bd46f4d8a09
-
SHA1
b3af6b0b022d3fd7245dfac4cce5fc643a9dd40d
-
SHA256
9e6322850e41c8474c6ad2d6fe5f43c75a1f7c43a9e79f8afa0756f28fc4937b
-
SHA512
d68ca88246ab4f36791b7b0604a531afd7cf2f2e7f3cc713a991afa021f8442402018bcaaaf33767c972939cc839ec13175b4a077162695ed076a2269986ab28
-
SSDEEP
12288:L9+jciSui5v8bVOfVw48sAoKDl+Fnq7FkK2j:6ri5EbVOfX8NxD8JFKI
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 78a5cce2648ad5ec2b864bd46f4d8a09
Files
-
78a5cce2648ad5ec2b864bd46f4d8a09.exe windows:4 windows x86 arch:x86
4ed0b96b62a73dc961fb2708f26c49b7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
GetCharWidth32W
DrawEscape
GetCharacterPlacementW
PlayEnhMetaFileRecord
GetFontLanguageInfo
GetCharWidthFloatW
GetCurrentPositionEx
PlayMetaFileRecord
SetPixelFormat
GetPixel
CreateHalftonePalette
ExtEscape
kernel32
GetConsoleCP
HeapDestroy
Sleep
GetCurrentThread
InterlockedDecrement
GetStartupInfoA
GetCommandLineA
IsValidCodePage
GetFileType
HeapCreate
TerminateProcess
OpenWaitableTimerA
GetCPInfo
WriteConsoleA
SetStdHandle
TlsSetValue
LeaveCriticalSection
GetSystemTimeAsFileTime
OpenMutexA
GetConsoleCursorInfo
InterlockedIncrement
UnhandledExceptionFilter
lstrcmpiA
GetCurrentProcessId
VirtualFree
GetProcAddress
SetUnhandledExceptionFilter
SetLastError
VirtualQuery
GetStdHandle
IsDebuggerPresent
MultiByteToWideChar
GetLocaleInfoW
HeapFree
WriteFile
WaitCommEvent
GetModuleHandleW
GetDateFormatA
CreateMailslotW
SetFilePointer
TlsAlloc
SetConsoleCtrlHandler
GetTimeZoneInformation
GetCommandLineW
SetConsoleScreenBufferSize
GetUserDefaultLCID
GetLastError
GetACP
GetStringTypeW
SetLocaleInfoA
SetHandleCount
EnumCalendarInfoW
CreateMutexA
GetCurrentProcess
RtlUnwind
LCMapStringA
FlushFileBuffers
GetModuleFileNameW
TlsFree
GetOEMCP
CreateFileA
FindFirstFileW
LoadLibraryA
FreeLibrary
SetEnvironmentVariableA
InitializeCriticalSectionAndSpinCount
WideCharToMultiByte
EnumSystemLocalesA
GetStringTypeA
GetEnvironmentStringsW
GetModuleHandleA
TlsGetValue
GetCurrentThreadId
GetConsoleOutputCP
CompareStringA
WriteConsoleW
GetConsoleMode
GetTickCount
CloseHandle
DeleteCriticalSection
InterlockedExchange
GetStartupInfoW
VirtualAlloc
QueryPerformanceCounter
GetTimeFormatA
GetModuleFileNameA
ExitProcess
FreeEnvironmentStringsW
HeapAlloc
CompareStringW
GetLocaleInfoA
ReadFile
HeapSize
EnterCriticalSection
IsValidLocale
HeapReAlloc
LCMapStringW
advapi32
CryptVerifySignatureA
RegOpenKeyExW
RegConnectRegistryA
RevertToSelf
RegQueryInfoKeyW
LookupAccountNameW
RegDeleteValueA
GetUserNameA
CreateServiceW
CryptExportKey
LookupPrivilegeDisplayNameW
CryptDestroyKey
CryptGetDefaultProviderW
RegNotifyChangeKeyValue
RegQueryValueExW
CryptGetUserKey
LogonUserA
CryptCreateHash
LookupAccountSidW
shell32
SHGetPathFromIDList
SheChangeDirA
ShellExecuteExW
SHEmptyRecycleBinW
ExtractIconW
user32
GetWindowTextA
SetMenuItemInfoW
GetAncestor
GetMonitorInfoA
GetMessageA
GetKeyNameTextW
CallMsgFilterW
CharUpperBuffA
CreateWindowExA
SetWinEventHook
DrawStateW
GetPriorityClipboardFormat
GetScrollBarInfo
CreateAcceleratorTableA
RegisterClassExA
IsCharAlphaW
IntersectRect
SetCursor
SetMessageQueue
RegisterClassA
SetWindowWord
LoadCursorFromFileW
SendMessageTimeoutW
GetNextDlgTabItem
SendDlgItemMessageA
comctl32
InitCommonControlsEx
wininet
InternetOpenW
Sections
.text Size: 236KB - Virtual size: 236KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 319KB - Virtual size: 319KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ