Static task
static1
Behavioral task
behavioral1
Sample
76766718841bb0e6083d691e018af1e6.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
76766718841bb0e6083d691e018af1e6.exe
Resource
win10v2004-20231215-en
General
-
Target
76766718841bb0e6083d691e018af1e6
-
Size
82KB
-
MD5
76766718841bb0e6083d691e018af1e6
-
SHA1
ae88e163fa39eb8992b05abcb17a8b50a9de0eca
-
SHA256
64af42e93f917310e71498a0d4df2aa2d25f60b649f883c7c3e8d11d698fe79d
-
SHA512
1f2668232b9877a31ab7574a33aff86fc15ffa39916873451144ac3d0d8bdd55b943b5c08e9127c0f921d5dda929dbc46f5bafdb5f3922f8cd03fa8c70cb379e
-
SSDEEP
1536:g9uSoSKIuKqxHgayAg7FgGo/BZxaBCv+8A8nYP/jb7daMQmN:gaIuKiyRFc/BfaL1Q8pN
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 76766718841bb0e6083d691e018af1e6
Files
-
76766718841bb0e6083d691e018af1e6.exe windows:5 windows x86 arch:x86
a540ea51df10744280d16c7f9bb89225
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentProcess
HeapAlloc
CreateEventW
GetFileAttributesA
GetExitCodeProcess
OpenEventA
GetDriveTypeA
GetShortPathNameW
CloseHandle
GetProcessHeap
FindClose
SetFileTime
GetThreadTimes
EnterCriticalSection
FormatMessageA
WaitForMultipleObjects
CreateThread
DeleteFileA
Sleep
EnumSystemCodePagesW
IsValidLanguageGroup
SetEnvironmentVariableA
GetEnvironmentVariableA
QueryDosDeviceA
GetSystemTimeAsFileTime
MoveFileA
FlushFileBuffers
GetNumberFormatA
SystemTimeToFileTime
SetLastError
WriteFile
GetFileSize
CreateFileA
VirtualQuery
FindNextFileA
SwitchToThread
CopyFileA
FindFirstFileA
GetSystemTime
GetDiskFreeSpaceA
GetTickCount
GetProcAddress
GetCommandLineA
DeleteCriticalSection
SetFileAttributesA
ReadFile
GetModuleFileNameA
SetFileAttributesA
GetCurrentThreadId
SetUnhandledExceptionFilter
GetSystemDirectoryA
SetEvent
LocalFileTimeToFileTime
ReleaseActCtx
DeviceIoControl
HeapFree
LeaveCriticalSection
CopyFileExW
TerminateProcess
DosDateTimeToFileTime
GetCurrentProcessId
SetErrorMode
SetVolumeLabelA
SetFilePointer
MoveFileExA
GetPrivateProfileIntW
QueryPerformanceCounter
SetEndOfFile
GlobalFlags
CreateProcessA
GetCurrentDirectoryA
GetVersionExA
user32
MessageBoxA
ShowWindow
GetKeyNameTextA
ChangeDisplaySettingsA
ole32
CoInitialize
CoUninitialize
CoCreateInstance
OleInitialize
comdlg32
GetOpenFileNameA
GetSaveFileNameW
GetOpenFileNameW
GetSaveFileNameA
PrintDlgA
Sections
.text Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 125KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.htux Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 129KB - Virtual size: 251KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ