Static task
static1
Behavioral task
behavioral1
Sample
77719ded07840a41d3dbc9659126c3fc.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
77719ded07840a41d3dbc9659126c3fc.exe
Resource
win10v2004-20231222-en
General
-
Target
77719ded07840a41d3dbc9659126c3fc
-
Size
441KB
-
MD5
77719ded07840a41d3dbc9659126c3fc
-
SHA1
397c075422e0f3ce8ee8fea976e1b794b8dc74e6
-
SHA256
51780335972ec80e221bfcd06f6824b8eb350650b904da12502d9957c7140a43
-
SHA512
29d0fa07bb1227b3a6949b2cdc9e0eb3a07ed88162b31318c127c7666beee0167d2f2f9cd94ef84ecef72e5cc6a686e09f1da282a75f39863aa53e87b2237931
-
SSDEEP
12288:8h4jhV2KnGnE5yUIS09ev9FAM5zShTT/9D/:8yjDlab7Swe75CTz9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 77719ded07840a41d3dbc9659126c3fc
Files
-
77719ded07840a41d3dbc9659126c3fc.exe windows:5 windows x86 arch:x86
f72a7cdf24a34e53c71dc425b5a6c61b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
wcslen
__CxxFrameHandler
free
malloc
wcscpy
_wcsicmp
_purecall
__RTDynamicCast
wcscmp
swscanf
wcschr
wcsrchr
wcsstr
_wcsnicmp
_initterm
_adjust_fdiv
??1type_info@@UAE@XZ
?terminate@@YAXXZ
__dllonexit
_onexit
_except_handler3
msvcp60
??0_Lockit@std@@QAE@XZ
??1_Lockit@std@@QAE@XZ
atl
ord15
ord22
ord18
ord21
ord16
ord32
advapi32
RegCloseKey
RegCreateKeyExW
RegOpenKeyExW
RegQueryValueExW
RegSetValueExW
FreeSid
LookupAccountSidW
RegDeleteValueW
RegOpenKeyW
RegEnumKeyW
RegEnumKeyExW
RegDeleteKeyW
LookupAccountNameW
mpr
WNetGetUniversalNameW
ole32
CoInitialize
StringFromGUID2
CoGetMalloc
StringFromCLSID
CoTaskMemFree
CoCreateInstance
CoTaskMemAlloc
CreateStreamOnHGlobal
ReleaseStgMedium
oleaut32
SysAllocString
SysFreeString
VariantClear
VariantInit
shell32
SHGetMalloc
SHBrowseForFolderW
SHGetPathFromIDListW
user32
LoadBitmapW
LoadStringW
SetCursor
LoadCursorW
wsprintfW
EnableWindow
SendMessageW
wvsprintfW
MessageBoxW
RegisterClipboardFormatW
SetWindowsHookExW
CallNextHookEx
UnhookWindowsHookEx
MessageBeep
SetParent
ScreenToClient
GetParent
IsWindowVisible
GetWindowRect
GetClientRect
WinHelpW
shlwapi
PathCompactPathW
PathIsUNCW
Sections
.text Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.upx Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.upack Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.aspack Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.usaa Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.uaan Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.uaak Size: 407KB - Virtual size: 408KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.uaaj Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 11KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ