Static task
static1
Behavioral task
behavioral1
Sample
03fc6a2e9183fb49f61f59e9a446c77026032a35f3e7073ecba5b6b7632a9a72.exe
Resource
win7-20240215-en
General
-
Target
03fc6a2e9183fb49f61f59e9a446c77026032a35f3e7073ecba5b6b7632a9a72
-
Size
181KB
-
MD5
8bd45266697037c3d98b347fb4ed0f0c
-
SHA1
ba2b8b78181e6018316fc15796bf5e70c87c26f8
-
SHA256
03fc6a2e9183fb49f61f59e9a446c77026032a35f3e7073ecba5b6b7632a9a72
-
SHA512
01fc1c612609b0f61d8816b8e4462a6a58a75abb8f4fc1fc31b176d6a39297910b1a6d1f463a6da2f66b3c4b4c970f89facc028be0338c73f5a3946ac2e88cc3
-
SSDEEP
3072:8Vi/IbhPRQaEjDuCy0iL0F0OJDcYZ+MAFwzYRw3s3lB7USot5+L/byAjx:UsQEN1iQwM2wz+SsVB7ViAl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 03fc6a2e9183fb49f61f59e9a446c77026032a35f3e7073ecba5b6b7632a9a72
Files
-
03fc6a2e9183fb49f61f59e9a446c77026032a35f3e7073ecba5b6b7632a9a72.exe windows:4 windows x86 arch:x86
998e61d6710cb3a6dd7148e1a6e829e1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
LeaveCriticalSection
GetTempPathW
GetComputerNameW
GetHandleInformation
SetConsoleMode
RemoveDirectoryW
PrepareTape
WritePrivateProfileStructA
InitializeCriticalSection
lstrcmpiW
GetFileAttributesA
GetWindowsDirectoryA
PurgeComm
EnumDateFormatsW
GetCommandLineW
CompareStringA
WriteConsoleOutputW
FormatMessageA
SetThreadLocale
GetCurrentProcessId
OutputDebugStringA
CreateProcessA
GetLocaleInfoW
GetFileType
GetConsoleMode
WritePrivateProfileSectionW
CreateMutexA
SetMailslotInfo
IsValidLocale
PeekConsoleInputW
SearchPathW
IsDBCSLeadByteEx
ReadFile
GetTickCount
SetHandleCount
GetDriveTypeW
EnumCalendarInfoW
ReadDirectoryChangesW
GetThreadContext
VirtualAlloc
lstrcpynA
GetEnvironmentStringsW
GetSystemDefaultLangID
GlobalFlags
EnumSystemCodePagesA
SuspendThread
GetPrivateProfileStringA
OutputDebugStringW
GetVolumeInformationW
user32
ClientToScreen
DrawStateA
IsCharLowerA
CallNextHookEx
SetWinEventHook
TranslateMDISysAccel
UnhookWindowsHookEx
CheckMenuItem
SendMessageTimeoutA
MoveWindow
AppendMenuA
DrawTextExA
msvcrt
vfprintf
_mbslwr
_beginthread
_wctime
wcsspn
_mbsupr
freopen
toupper
abort
_spawnvp
iswascii
fseek
_ecvt
_mbsnextc
wctomb
_wcsicoll
_ltoa
_chsize
_tempnam
swprintf
fputc
_ui64tow
strchr
Sections
.text Size: 8KB - Virtual size: 112KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 152KB - Virtual size: 150KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ