Static task
static1
Behavioral task
behavioral1
Sample
a9c72eb9a7f71a90adf56c25129be16d.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a9c72eb9a7f71a90adf56c25129be16d.exe
Resource
win10v2004-20240226-en
General
-
Target
a9c72eb9a7f71a90adf56c25129be16d
-
Size
94KB
-
MD5
a9c72eb9a7f71a90adf56c25129be16d
-
SHA1
0ab15d300358890fa04985a666d9397375b4ef47
-
SHA256
667dedb2d65cfa0a322ad4d24b0ecc250f0fa2ed6d2d3f86e74f1cf55f131072
-
SHA512
69ea6c29c071137048a4e59a7b4eb37639ee1f491013583a484460a5ff9792c28b09d30860f602724ad99eee7d018dc552b90beaf8195b358702c1f271df1c58
-
SSDEEP
768:gZtoJOhEMk2NjTI8rw+ZDvTunKN431SRuBtDzur+NyIwCa9jucc7AWSBHERUXVSF:gmMN4yvSnKIIQdBZ0juPkBHk0AHTf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a9c72eb9a7f71a90adf56c25129be16d
Files
-
a9c72eb9a7f71a90adf56c25129be16d.exe windows:4 windows x86 arch:x86
d53799e2e71aad8fb199ea9ec0abc96a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
shell32
ShellExecuteA
user32
TrackMouseEvent
BeginPaint
CallWindowProcA
ClientToScreen
CopyImage
CreateWindowExA
DefWindowProcA
DeleteMenu
DestroyAcceleratorTable
DestroyIcon
DestroyWindow
DispatchMessageA
EnableMenuItem
EnableWindow
EndPaint
FillRect
GetCapture
GetClassInfoA
GetClassLongA
GetClientRect
GetCursorPos
GetDC
GetFocus
GetKeyState
GetParent
GetPropA
GetSysColor
GetSystemMenu
GetUpdateRect
GetUpdateRgn
GetWindow
GetWindowDC
GetWindowLongA
GetWindowRect
InvalidateRect
InvalidateRgn
IsIconic
IsWindow
IsWindowEnabled
IsWindowVisible
IsZoomed
LoadCursorA
LoadIconA
MessageBoxA
MoveWindow
PeekMessageA
PostMessageA
PostQuitMessage
RegisterClassA
RegisterWindowMessageA
ReleaseCapture
ReleaseDC
RemovePropA
ScreenToClient
SendMessageA
SetCapture
SetCursor
SetFocus
SetForegroundWindow
SetPropA
SetWindowLongA
SetWindowPos
SetWindowTextA
ShowWindow
TranslateMessage
UpdateWindow
ValidateRect
WaitMessage
OffsetRect
InflateRect
MessageBoxA
advapi32
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
kernel32
CloseHandle
GetCommandLineA
GetModuleFileNameA
GetModuleHandleA
GetPrivateProfileIntA
GetProcAddress
LoadLibraryA
TerminateProcess
WinExec
WritePrivateProfileStringA
GetLastError
GetModuleFileNameA
GetModuleHandleA
GetProcessHeap
HeapAlloc
HeapFree
WriteFile
ReadFile
CloseHandle
SetFilePointer
CreateFileA
GetFileType
GetStartupInfoA
GetStdHandle
GetCommandLineA
GetCurrentProcessId
GetCurrentThreadId
GetCurrentProcess
ReadProcessMemory
SetUnhandledExceptionFilter
ExitProcess
gdi32
BitBlt
CombineRgn
CreateCompatibleBitmap
CreateCompatibleDC
CreateDIBSection
CreateFontIndirectA
CreateRectRgn
CreateRectRgnIndirect
CreateSolidBrush
DeleteDC
DeleteObject
ExcludeClipRect
GetDeviceCaps
GetObjectA
GetStockObject
GetTextExtentPoint32A
GetWindowOrgEx
IntersectClipRect
MoveToEx
RestoreDC
SaveDC
SelectClipRgn
SelectObject
SetBkColor
SetBkMode
SetBrushOrgEx
SetROP2
SetTextColor
SetWindowOrgEx
StretchDIBits
CreateFontIndirectA
comctl32
InitCommonControls
Sections
.text Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 5KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE