Static task
static1
Behavioral task
behavioral1
Sample
b75445c0d78e382eef031416e2d87dbc.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b75445c0d78e382eef031416e2d87dbc.exe
Resource
win10v2004-20240226-en
General
-
Target
b75445c0d78e382eef031416e2d87dbc
-
Size
60KB
-
MD5
b75445c0d78e382eef031416e2d87dbc
-
SHA1
6cf27e4e3e64055a6badc4031a324f85245d0688
-
SHA256
02d217749c0a0f02a5cb415de6d25aa930df7c6d6fb6057da5528c6a063617af
-
SHA512
8b6e1e491dccf4bf57ebe2b86756ab27f7372c786d751960ae19c3858adb78a48444280b86eb3d668b8e4dcf0a779cfb77a1455267aff1cc4c69d0ea3e3b2b40
-
SSDEEP
1536:VF3dvqWjfNe0FQ814ksgSXp1vT7aE0t9THiW5h1:jdv57SkLovTeP3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b75445c0d78e382eef031416e2d87dbc
Files
-
b75445c0d78e382eef031416e2d87dbc.exe windows:5 windows x86 arch:x86
e36b574b64045e63e3e575f97d723d15
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ifsutil
?QueryParents@DIGRAPH@@QBEEKPAVNUMBER_SET@@@Z
?Initialize@SPARSE_SET@@QAEEXZ
?RestoreThreadExecutionState@@YGXJK@Z
??1MOUNT_POINT_MAP@@UAE@XZ
?DismountVolume@IFS_SYSTEM@@SGEPBVWSTRING@@@Z
?SendSonyMSInquiryCmd@DP_DRIVE@@QAEEPAUSONY_MS_INQUIRY_DATA@@@Z
?GetBuffer@TLINK@@QAEPAXPAX@Z
?GetSortedFirst@TLINK@@QAEPAXXZ
?AddDriveName@MOUNT_POINT_MAP@@QAEEPAVWSTRING@@0@Z
?Format@VOL_LIODPDRV@@QAE?AW4FORMAT_ERROR_CODE@@PBVWSTRING@@PAVMESSAGE@@KKK@Z
?ReverseCopy@INTSTACK@@QAEEPAV1@@Z
?IsFrontEndPresent@AUTOREG@@SGEPBVWSTRING@@0@Z
?FileSetAttributes@IFS_SYSTEM@@SGEPBVWSTRING@@KPAK@Z
??0DIGRAPH_EDGE@@QAE@XZ
?ForceAutochk@VOL_LIODPDRV@@QAEEEKKGPBVWSTRING@@@Z
?QueryNtfsVersion@IFS_SYSTEM@@SGEPAE0PAVLOG_IO_DP_DRIVE@@PAX@Z
?GetDrive@SUPERAREA@@QAEPAVIO_DP_DRIVE@@XZ
ntdll
RtlQueryInformationActivationContext
CsrClientCallServer
NtAccessCheckByType
_CIsin
RtlEraseUnicodeString
RtlStartRXact
LdrLockLoaderLock
NtAccessCheckAndAuditAlarm
NtGetDevicePowerState
kernel32
GetVolumePathNamesForVolumeNameW
CallNamedPipeW
AllocateUserPhysicalPages
GetACP
GetSystemTimeAsFileTime
ReadConsoleOutputW
LoadLibraryA
FoldStringW
IsValidLocale
ShowConsoleCursor
GetCommandLineW
GetNumberOfConsoleMouseButtons
SetFilePointerEx
SetLocaleInfoA
SetCalendarInfoA
AddConsoleAliasW
GlobalAlloc
IsDebuggerPresent
advapi32
GetSecurityDescriptorOwner
OpenSCManagerA
AccessCheckByTypeResultListAndAuditAlarmByHandleA
SystemFunction022
SetSecurityInfoExW
LsaLookupPrivilegeValue
SystemFunction004
LsaQueryForestTrustInformation
CredUnmarshalCredentialA
LookupSecurityDescriptorPartsA
RegUnLoadKeyA
A_SHAInit
user32
DeviceEventWorker
GetTabbedTextExtentW
ActivateKeyboardLayout
SetCapture
CreateDesktopW
DdeKeepStringHandle
EditWndProc
DdeImpersonateClient
HiliteMenuItem
GetKeyboardLayoutNameW
EnumThreadWindows
dsprop
ADsPropSetHwnd
ADsPropCreateNotifyObj
ADsPropGetInitInfo
ADsPropCheckIfWritable
Sections
.text Size: 41KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ