Static task
static1
Behavioral task
behavioral1
Sample
85ff791375344146d573fb8df7f323ac.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
85ff791375344146d573fb8df7f323ac.exe
Resource
win10v2004-20231222-en
General
-
Target
85ff791375344146d573fb8df7f323ac
-
Size
408KB
-
MD5
85ff791375344146d573fb8df7f323ac
-
SHA1
1002c13e73788efa4fbe4d671b20d3ef910f8bab
-
SHA256
67a4042f8ce40e2400d30e571386bd2f0c51c3d630f10d31654a876e3612ed5c
-
SHA512
caaf552998ad5945a5cb8fccfd9660191e506f78f61305b39a222d4dac4972b38182206b0bc807f12d092be994623c276724bbd8115d7dea97d16f5012ef309c
-
SSDEEP
6144:zLcJX+MhDKYrX/Qjjh5or/+UEA50IsBDvNP624y2XO3cBoFZbK:7umQXIx5or/CnIQDvV62IRC7bK
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 85ff791375344146d573fb8df7f323ac
Files
-
85ff791375344146d573fb8df7f323ac.exe windows:4 windows x86 arch:x86
04766195ce43fbcfb25ebdeabecf97c5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FreeLibrary
VirtualFreeEx
SetLastError
CreateMutexA
VirtualFree
GetModuleHandleA
GetTickCount
ReadFile
CreateFileA
FreeResource
SizeofResource
LockResource
LoadResource
FindResourceExA
VirtualProtect
GetModuleHandleW
GetProcAddress
CloseHandle
LocalAlloc
GlobalFree
WriteFile
GlobalAlloc
UnlockFile
LockFile
SetFilePointer
LoadLibraryA
CreateEventA
SystemTimeToFileTime
GetSystemTime
FindClose
FindNextFileA
EndUpdateResourceA
UpdateResourceA
BeginUpdateResourceA
VirtualAlloc
UnlockFileEx
LockFileEx
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
MultiByteToWideChar
FlushFileBuffers
GetOEMCP
GetACP
GetCPInfo
RtlUnwind
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
SetStdHandle
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetModuleFileNameA
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
HeapReAlloc
HeapCreate
HeapDestroy
GetVersion
GetCommandLineA
GetStartupInfoA
HeapAlloc
HeapFree
CreateSemaphoreA
LoadLibraryW
VirtualAllocEx
Sleep
GetTempPathA
ExitProcess
CopyFileA
GetLastError
GetSystemDirectoryA
GetCurrentDirectoryA
DeleteFileA
SetCurrentDirectoryA
user32
TranslateMessage
ReleaseDC
ShowCaret
HideCaret
DispatchMessageA
GetDesktopWindow
IsWindow
IsWindowVisible
SetWindowRgn
CopyImage
DestroyIcon
CreateIconIndirect
EndDialog
DialogBoxParamA
DestroyWindow
DefWindowProcA
BeginPaint
GetClientRect
DrawTextA
PostQuitMessage
CreateWindowExA
ShowWindow
UpdateWindow
LoadIconA
LoadCursorA
RegisterClassExA
LoadStringA
DrawIcon
LoadAcceleratorsA
GetMessageA
TranslateAcceleratorA
GetDC
EndPaint
gdi32
CreateCompatibleBitmap
GetObjectA
EnumObjects
CreateDCA
CreatePen
CreateSolidBrush
SelectObject
Rectangle
DeleteObject
GetDeviceCaps
GetDIBits
shell32
StrStrIA
ole32
CoUninitialize
CoInitialize
Sections
.text Size: 184KB - Virtual size: 183KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 28KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.dbg Size: 164KB - Virtual size: 520KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ssl Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE