Static task
static1
Behavioral task
behavioral1
Sample
87d863b93fd10b4daef2da0d11fd921f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
87d863b93fd10b4daef2da0d11fd921f.exe
Resource
win10v2004-20231215-en
General
-
Target
87d863b93fd10b4daef2da0d11fd921f
-
Size
500KB
-
MD5
87d863b93fd10b4daef2da0d11fd921f
-
SHA1
30c26ec33aa427d09413fe0eba1f6050b292ca46
-
SHA256
94207c3a0d9ac63d9c772bea6d59c8054c255b2ca5bbb02ad75ae26c5ec05cd9
-
SHA512
4c7d4918806fffd06957cee092eead713fab29fa8a141c14e4c4caf184d0c5028afb9ab9d852a467e8e74746ea961111b7bd29a64a4fa10eea0ee6802bb7c90f
-
SSDEEP
6144:XDI3FzZ9CBhza2ErAUwIAnjMMChCGW0e1jzQJHYSNbF8Dl4OqXwiTmQHUE7l+y5L:29CHz7UxlBjed5B4OqXxTmQ0Ih52Y1t
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 87d863b93fd10b4daef2da0d11fd921f
Files
-
87d863b93fd10b4daef2da0d11fd921f.exe windows:4 windows x86 arch:x86
5ccbd8612c61e5415ffbd410ee517788
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
ShowCaret
GetClassWord
DrawTextA
RegisterClassExA
RegisterClassA
DdeImpersonateClient
GetActiveWindow
GetScrollPos
OpenWindowStationW
BringWindowToTop
EndMenu
CharUpperA
GetClipboardOwner
SetMenu
EnumDesktopsA
DdeSetQualityOfService
BeginPaint
RegisterDeviceNotificationA
DlgDirSelectExW
GetUserObjectSecurity
wininet
GetUrlCacheEntryInfoExA
InternetGetCookieA
HttpQueryInfoW
HttpAddRequestHeadersW
UpdateUrlCacheContentPath
InternetQueryOptionW
ShowCertificate
HttpCheckDavCompliance
CreateUrlCacheContainerW
kernel32
GetACP
IsValidLocale
LCMapStringA
TerminateProcess
GetLocaleInfoA
LoadLibraryA
LeaveCriticalSection
VirtualQuery
GetCommandLineW
VirtualAlloc
GetCommandLineA
VirtualFree
HeapReAlloc
GetStringTypeA
WideCharToMultiByte
InterlockedExchange
GetCurrentProcess
GetStartupInfoA
IsValidCodePage
HeapCreate
GetModuleFileNameA
GetCurrentThread
TlsFree
VirtualProtect
HeapSize
ExitProcess
CreateNamedPipeW
GetModuleFileNameW
GetStartupInfoW
EnumSystemLocalesA
HeapDestroy
GetLocaleInfoW
TlsSetValue
GetDateFormatA
MultiByteToWideChar
GetOEMCP
FreeEnvironmentStringsA
UnhandledExceptionFilter
IsBadWritePtr
LCMapStringW
HeapFree
OpenMutexA
GetStringTypeW
TlsGetValue
GetTimeFormatA
QueryPerformanceCounter
GetCurrentProcessId
DeleteCriticalSection
GetUserDefaultLCID
CreateMutexA
GetStdHandle
HeapAlloc
CloseHandle
GetTickCount
GetCurrentThreadId
GetCPInfo
TlsAlloc
GetProcAddress
FlushFileBuffers
GetLastError
FreeEnvironmentStringsW
CompareStringW
GetSystemInfo
SetEnvironmentVariableA
GetModuleHandleA
GetVersionExA
GetTimeZoneInformation
GetFileType
SetLastError
SetHandleCount
CompareStringA
EnterCriticalSection
GetEnvironmentStringsW
SetStdHandle
ReadFile
SetFilePointer
InitializeCriticalSection
RtlUnwind
GetSystemTimeAsFileTime
GetEnvironmentStrings
WriteFile
shell32
SHFormatDrive
ShellExecuteW
FindExecutableA
comctl32
InitCommonControlsEx
Sections
.text Size: 172KB - Virtual size: 172KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 313KB - Virtual size: 312KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ