Static task
static1
Behavioral task
behavioral1
Sample
99b321cabb9a677292cfe96af90bc965ec9244487623f15c1ea21f00c95cafc7.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
99b321cabb9a677292cfe96af90bc965ec9244487623f15c1ea21f00c95cafc7.exe
Resource
win10v2004-20240226-en
General
-
Target
99b321cabb9a677292cfe96af90bc965ec9244487623f15c1ea21f00c95cafc7
-
Size
158KB
-
MD5
110b9db90043341f6af33cfccb770cd7
-
SHA1
3c4bb70ff23efb21ad2d479e840409af231c56ab
-
SHA256
99b321cabb9a677292cfe96af90bc965ec9244487623f15c1ea21f00c95cafc7
-
SHA512
910063938701b0a72943f039925657d8fdba882b8782cb0016aa56ed95bb0ee6564eb5ce8989de28a0a6dc63635c2820300418e5e5a920fc1d51e2a49c7a2053
-
SSDEEP
3072:DeLHcU8KuGTRZtcfsOGMOvsJvVkcfyNz51rLqX1Rm0uR8hmC:DeLcO/c+MOvs/fyNz7rL6xuR8hmC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 99b321cabb9a677292cfe96af90bc965ec9244487623f15c1ea21f00c95cafc7
Files
-
99b321cabb9a677292cfe96af90bc965ec9244487623f15c1ea21f00c95cafc7.exe windows:5 windows x86 arch:x86
be4216be219f8366c0b707866ef1c614
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mfc90
ord2074
ord5585
ord4638
ord1497
ord4331
ord1752
ord1755
ord6391
ord3346
ord1668
ord2274
ord3519
ord4650
ord1108
ord300
ord820
ord374
ord3506
ord4668
ord5636
ord1496
ord6388
ord3344
ord1678
ord1809
ord1810
ord5309
ord5152
ord4617
ord5615
ord2057
ord1938
ord6740
ord310
ord1611
ord305
ord3213
ord945
ord2539
ord4431
ord6584
ord3987
ord4993
ord1555
ord2623
ord663
ord5520
ord404
ord899
ord5753
ord6062
ord3534
ord1183
ord2106
ord3477
ord1358
ord3627
ord1357
ord6074
ord3617
ord1710
ord1779
ord750
ord636
ord6554
ord367
ord3504
ord6157
ord6398
ord5833
ord5846
ord6023
ord5957
ord6084
ord6079
ord6166
ord6527
ord6352
ord6549
ord4565
ord6546
ord5497
ord6552
ord6046
ord2753
ord744
ord6071
ord6170
ord2614
ord524
ord4030
ord2605
ord2607
ord2625
ord2375
ord2368
ord1644
ord6784
ord4160
ord6782
ord3671
ord5389
ord6356
ord3218
ord1446
ord5608
ord2139
ord1792
ord1791
ord1728
ord5633
ord3135
ord3277
ord4895
ord3480
ord595
ord2069
ord1137
ord1098
ord2208
ord611
ord654
ord639
ord793
ord4434
ord4409
ord6783
ord4159
ord6781
ord4733
ord2251
ord2206
ord6018
ord4165
ord1046
ord5533
ord6721
ord5813
ord4199
ord2087
ord3209
ord5657
ord5659
ord2447
ord4333
ord4981
ord5663
ord5646
ord6001
ord2766
ord2978
ord3107
ord4714
ord2961
ord3110
ord2769
ord2888
ord2759
ord4066
ord4067
ord4057
ord2886
ord4334
ord4890
ord4667
ord3659
ord589
ord6780
ord4589
ord5647
ord3732
ord5139
ord4688
ord1729
ord6446
ord5668
ord5666
ord958
ord963
ord967
ord965
ord969
ord2610
ord6043
ord2630
ord4952
ord4029
ord6682
ord5997
ord3178
ord4392
ord817
ord2691
ord5835
ord1603
ord2327
ord4311
ord910
ord316
ord2620
ord2618
ord2616
ord2633
ord2628
ord2612
ord2470
ord2635
ord601
ord800
ord1276
msvcr90
_setmbcp
_controlfp_s
_invoke_watson
_except_handler4_common
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_crt_debugger_hook
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
_exit
_cexit
__getmainargs
_amsg_exit
?terminate@@YAXXZ
_decode_pointer
_onexit
_lock
_encode_pointer
__dllonexit
_unlock
calloc
memcpy
free
strncmp
strncpy
sprintf
rand
__CxxFrameHandler3
kernel32
GetCurrentThreadId
Sleep
GetSystemTimeAsFileTime
GetCurrentProcessId
MultiByteToWideChar
GetTickCount
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetStartupInfoA
InterlockedCompareExchange
InterlockedExchange
GetModuleFileNameA
GetTempPathA
user32
GetSysColor
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
RedrawWindow
InvalidateRect
GetClientRect
PostQuitMessage
PeekMessageA
TranslateMessage
DispatchMessageA
LoadIconA
EnableWindow
SendMessageA
SetWindowTextA
IsWindow
gdi32
CreateRectRgn
ExtTextOutA
Escape
CreateCompatibleBitmap
TextOutA
RectVisible
PtVisible
BitBlt
CreateCompatibleDC
shell32
SHGetSpecialFolderPathA
ShellExecuteExA
SHGetMalloc
SHGetDesktopFolder
SHBrowseForFolderA
SHGetPathFromIDListA
Sections
.text Size: 34KB - Virtual size: 34KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ