Static task
static1
Behavioral task
behavioral1
Sample
87fc9ea568b60099e222f371250d3bcd.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
87fc9ea568b60099e222f371250d3bcd.exe
Resource
win10v2004-20231215-en
General
-
Target
87fc9ea568b60099e222f371250d3bcd
-
Size
444KB
-
MD5
87fc9ea568b60099e222f371250d3bcd
-
SHA1
5a5c6861592f8b7811289e5478ecceb88695f01c
-
SHA256
57ca20c8de058c3fc2f07285c9322a1dfa91cf785fdc2afb60088c0fb6bb3a88
-
SHA512
8fbcdfeb233224c9a29c07c84ff88cb9cd5506f2ccd7e7525748155c936da749e3372565dba293a29736a73b3cc56c8f66ec9cc6b152b7d03a41295dde454391
-
SSDEEP
6144:1d6ecOq0p7cF2NJTA1FUojsTm2M9LzgOApihTbId36xt3QNXN8wVe:1UNawQJs1eo4TmEpOgdmhQ39
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 87fc9ea568b60099e222f371250d3bcd
Files
-
87fc9ea568b60099e222f371250d3bcd.exe windows:4 windows x86 arch:x86
3498610c26f6a75c5c0108de305966aa
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegSetValueExA
AdjustTokenPrivileges
RegCreateKeyExA
oleaut32
LoadTypeLi
gdi32
GetTextMetricsA
GetRgnBox
SetViewportExtEx
CreateCompatibleDC
GetWindowExtEx
SetBkColor
ScaleViewportExtEx
ExcludeClipRect
Ellipse
SelectObject
GetTextColor
SetAbortProc
SetPolyFillMode
SelectPalette
GetTextExtentPoint32A
GetBkColor
CreateFontA
SetViewportOrgEx
CreatePalette
RealizePalette
SetPixelV
ScaleWindowExtEx
GetPixel
user32
RedrawWindow
EmptyClipboard
TranslateMessage
LoadCursorA
ScreenToClient
EqualRect
IsRectEmpty
GetWindowLongA
GetWindow
CharNextA
SetCursor
RegisterClassA
TabbedTextOutA
GetCursorPos
MessageBeep
CopyIcon
EnableMenuItem
GetClientRect
IsDialogMessageA
GetCapture
DefWindowProcA
DrawTextA
DrawIcon
InflateRect
GetFocus
PeekMessageA
SetWindowPos
GetTabbedTextExtentA
MessageBoxA
ScrollWindow
SetDlgItemTextA
GetNextDlgTabItem
GetActiveWindow
GetSystemMenu
UpdateWindow
WinHelpA
SetFocus
RegisterClassExA
CallNextHookEx
DeferWindowPos
DestroyWindow
RegisterClipboardFormatA
MapWindowPoints
IsIconic
GetDesktopWindow
LoadAcceleratorsA
OffsetRect
GetWindowRect
GetNextDlgGroupItem
DrawFrameControl
IsWindowEnabled
SetWindowLongA
SetRect
PostThreadMessageA
wsprintfA
GetDlgCtrlID
PostQuitMessage
ReleaseCapture
PostMessageA
GetClipboardFormatNameA
SendMessageA
LoadStringA
GetMenuCheckMarkDimensions
InvalidateRect
LoadIconA
ReleaseDC
IsWindow
SystemParametersInfoA
CreateWindowExA
SetParent
GetKeyboardState
SetForegroundWindow
GetDlgItem
GetSubMenu
GetClassNameA
RegisterWindowMessageA
ValidateRect
GetSysColor
ShowCaret
ShowWindow
TranslateAcceleratorA
CreateAcceleratorTableA
shlwapi
PathCompactPathW
PathRemoveBackslashW
PathAddBackslashW
ole32
CLSIDFromProgID
StringFromCLSID
OleIsCurrentClipboard
CoTaskMemAlloc
IsAccelerator
OleSetContainedObject
OleUninitialize
CLSIDFromString
OleTranslateAccelerator
CoLockObjectExternal
OleCreateMenuDescriptor
OleDestroyMenuDescriptor
kernel32
GetStringTypeW
GetTimeZoneInformation
DuplicateHandle
GetCurrentDirectoryA
IsValidCodePage
FreeResource
GetStringTypeA
LockResource
HeapDestroy
QueryPerformanceCounter
TlsAlloc
LoadLibraryA
VirtualFree
WriteConsoleW
GetOEMCP
GlobalAddAtomA
GlobalUnlock
RtlUnwind
VirtualProtect
CompareFileTime
GetFileType
DeleteCriticalSection
GlobalHandle
DeleteFileA
GlobalLock
GetCurrentThreadId
GetProcessHeap
InterlockedIncrement
CloseHandle
lstrcpynA
SetLastError
lstrcmpiA
LCMapStringA
GetACP
OutputDebugStringA
GetModuleHandleA
SetCurrentDirectoryA
RaiseException
LCMapStringW
GetConsoleOutputCP
FindFirstFileW
VirtualAlloc
WriteFile
GetSystemInfo
OpenMutexA
GetCPInfo
GetSystemTimeAsFileTime
FreeEnvironmentStringsW
GetFileTime
GetModuleFileNameA
FindNextFileW
SetThreadPriority
SetUnhandledExceptionFilter
SetEnvironmentVariableA
HeapFree
FreeEnvironmentStringsA
TlsSetValue
GetVersionExA
GetCurrentThread
HeapSize
MapViewOfFile
FormatMessageA
UnhandledExceptionFilter
GlobalFree
lstrlenA
_llseek
FileTimeToSystemTime
SuspendThread
GetFileSize
GetEnvironmentStrings
CreateFileW
LeaveCriticalSection
WriteConsoleA
GetLocalTime
CopyFileA
WideCharToMultiByte
InterlockedExchange
WaitForSingleObject
TlsGetValue
CreateFileA
LockFile
GetTimeFormatA
HeapCreate
FatalAppExitA
GetStartupInfoA
CreateMutexA
FreeLibrary
InterlockedDecrement
FindClose
FlushFileBuffers
CreateDirectoryW
SetStdHandle
GetSystemDirectoryA
GetEnvironmentStringsW
GetLocaleInfoA
GlobalSize
IsValidLocale
HeapReAlloc
GetTickCount
GetDateFormatA
MultiByteToWideChar
TlsFree
SetHandleCount
ExitProcess
VirtualQuery
LocalFileTimeToFileTime
EnumSystemLocalesA
HeapAlloc
SetFilePointer
GetStdHandle
GetCurrentProcessId
InitializeCriticalSection
SetEvent
UnlockFile
SetFileAttributesA
GetProcAddress
GetExitCodeProcess
GetDriveTypeA
EnterCriticalSection
ReadFile
CompareStringW
TerminateProcess
GetConsoleCP
GetLocaleInfoW
SetEndOfFile
GetCommandLineA
GetUserDefaultLCID
GetCurrentProcess
CompareStringA
IsBadWritePtr
GetLastError
GetFullPathNameA
Sections
.text Size: 92KB - Virtual size: 90KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 252KB - Virtual size: 250KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 72KB - Virtual size: 83KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ