Static task
static1
Behavioral task
behavioral1
Sample
76a84724660c967458b3ac21412e3811.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
76a84724660c967458b3ac21412e3811.exe
Resource
win10v2004-20231222-en
General
-
Target
76a84724660c967458b3ac21412e3811
-
Size
248KB
-
MD5
76a84724660c967458b3ac21412e3811
-
SHA1
a82c5d70d92adfd31c1c41d077b474b2b5655f3c
-
SHA256
49a778d1d1ffa7e401ce0969d0706a243355802cee440c6ff238aa70aff29bbb
-
SHA512
7f3a69564440f45dfb9653cbacd132992a980522330797a98b98bafe54ad2cbaffee970ef3977413a9b56146640675070a472aa8c603ba003975f0fde6b13f89
-
SSDEEP
3072:oYkTXtzgJVKnjYn+i6id85B1xrBAN2U6vg5m/cFKU8VbqFTtO+:dqXtuKnjYn16g85B1xrBfY5mkcBA5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 76a84724660c967458b3ac21412e3811
Files
-
76a84724660c967458b3ac21412e3811.exe windows:4 windows x86 arch:x86
549172d859fc5f63b5affd3eea3056b8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WriteFile
SetFilePointer
CreateFileA
CopyFileA
ReadFile
HeapFree
GetProcessHeap
GetFileSize
GetFileAttributesA
Sleep
CreateMutexA
HeapAlloc
GlobalUnlock
GlobalSize
GlobalLock
GetLastError
FindClose
FindNextFileA
FindFirstFileA
CreateProcessA
SetCurrentDirectoryA
GetCurrentThreadId
GetVersionExA
GetSystemDefaultLangID
GetModuleFileNameA
GlobalAlloc
ExitProcess
lstrlenA
SetFileAttributesA
lstrcatA
lstrcpyA
TerminateThread
CreateThread
SetEvent
lstrcmpA
WaitForMultipleObjects
CreateEventA
InterlockedDecrement
TerminateProcess
CloseHandle
MultiByteToWideChar
lstrlenW
RtlUnwind
QueryDosDeviceA
DefineDosDeviceA
SetEnvironmentVariableA
CompareStringW
CompareStringA
FlushFileBuffers
InitializeCriticalSection
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
LoadLibraryA
GetCurrentProcessId
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
SetEndOfFile
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
GetTimeZoneInformation
DeleteFileA
ExpandEnvironmentStringsA
GetTempPathA
GetTickCount
GetTempFileNameA
GetLocalTime
ReleaseMutex
WideCharToMultiByte
WaitForSingleObject
HeapSize
SetHandleCount
HeapReAlloc
VirtualAlloc
EnterCriticalSection
DeviceIoControl
GetSystemDirectoryA
GetVolumeInformationA
LocalFree
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
UnhandledExceptionFilter
SetUnhandledExceptionFilter
LeaveCriticalSection
DeleteCriticalSection
VirtualFree
HeapCreate
HeapDestroy
GetOEMCP
GetCPInfo
GetStdHandle
SetLastError
InterlockedIncrement
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetModuleHandleA
GetProcAddress
GetStartupInfoA
GetCommandLineA
GetFileType
GetConsoleMode
GetConsoleCP
RaiseException
GetSystemTimeAsFileTime
IsDebuggerPresent
GetCurrentProcess
user32
PostMessageA
CloseClipboard
SetClipboardData
EmptyClipboard
SendMessageA
GetClipboardData
SetForegroundWindow
FindWindowA
SetWindowTextA
SetWindowPos
IsWindow
OpenClipboard
GetForegroundWindow
SetWindowLongA
GetWindowLongA
GetClassNameA
keybd_event
wsprintfA
PeekMessageA
TranslateMessage
DispatchMessageA
EnumChildWindows
GetDesktopWindow
GetWindowTextA
GetWindowThreadProcessId
SystemParametersInfoA
AllowSetForegroundWindow
GetKeyboardState
advapi32
RegDeleteValueA
RegEnumKeyExA
RegCreateKeyExA
RegCloseKey
RegOpenKeyExA
RegSetValueExA
RegQueryValueExA
RegCreateKeyA
shell32
SHGetFolderPathA
ole32
CoCreateInstance
CoInitialize
CoUninitialize
oleaut32
SysStringLen
SysAllocString
DispCallFunc
VariantClear
VariantInit
SysFreeString
shlwapi
StrStrIW
StrStrA
StrChrW
StrChrIW
wininet
InternetCrackUrlA
InternetOpenA
InternetConnectA
InternetCloseHandle
InternetReadFile
HttpSendRequestA
HttpAddRequestHeadersA
HttpOpenRequestA
ws2_32
WSASocketA
connect
closesocket
WSAStartup
htons
gethostbyname
inet_addr
recv
send
Sections
.text Size: 204KB - Virtual size: 203KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE