Static task
static1
Behavioral task
behavioral1
Sample
c76a483d44b04828774510fcef4869fa.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c76a483d44b04828774510fcef4869fa.exe
Resource
win10v2004-20231215-en
General
-
Target
c76a483d44b04828774510fcef4869fa
-
Size
199KB
-
MD5
c76a483d44b04828774510fcef4869fa
-
SHA1
6a62d2aff9d3cc05ad2d568255ec017077827447
-
SHA256
4e0fd9d4aed80a3f032ed9bd11f39fe2078a56110c2da64d69a735520e411a9a
-
SHA512
82cc00bd4f60d1490efd98ab26d699baa37bd0661a34496239c661121d731382023b26ecd0fb543fff8b17336f1f1adae619dbfccad7cd7fc5b48cda6ac5c6ce
-
SSDEEP
3072:CiUC4wpQeQKKakfl1N+8LPNz3Ogyr8MWkohztL8zq/0ElumQRilTz6VgA2KddcIe:q8iYkfl1k85+F8/RV5Tum8JWIqEYT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c76a483d44b04828774510fcef4869fa
Files
-
c76a483d44b04828774510fcef4869fa.exe windows:4 windows x86 arch:x86
b5900d7f94413f3a7fe1b29e7528fc3e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindAtomW
GetTempPathA
RemoveDirectoryA
OpenMutexW
SetLocaleInfoA
GetFileType
GetTempFileNameA
GetModuleFileNameW
MulDiv
GetNumberFormatA
GetLongPathNameW
lstrcatA
GetCalendarInfoA
GetCPInfo
IsValidCodePage
GetAtomNameW
GetLogicalDriveStringsW
GetStartupInfoW
GetModuleHandleA
SetErrorMode
GetHandleInformation
GetCurrentDirectoryW
ExitThread
ReadDirectoryChangesW
GetProcAddress
CompareStringA
user32
GetKeyboardType
AdjustWindowRect
mouse_event
LoadMenuA
LoadBitmapW
CharNextA
GetForegroundWindow
SetDlgItemTextW
FrameRect
CheckDlgButton
ShowCursor
InvalidateRgn
GetKeyboardLayout
SetTimer
wvsprintfW
GetDCEx
GetDesktopWindow
EnableMenuItem
GetWindowTextW
CreateDialogIndirectParamW
GetParent
GetWindowLongW
GetDlgItemTextW
CreateDialogParamA
LoadMenuIndirectW
GetClassInfoA
wsprintfW
GetMessageA
LoadIconA
GetAsyncKeyState
LoadIconW
GetSystemMetrics
GetFocus
PostMessageW
IsChild
DestroyIcon
EnumWindows
WaitMessage
GetDlgItemInt
UnregisterClassW
CloseWindow
gdi32
DeleteMetaFile
FillPath
GetTextExtentPointW
GetTextExtentPointI
GetDIBColorTable
PtInRegion
FillRgn
SetROP2
GetMiterLimit
GetCharABCWidthsW
GetRandomRgn
advapi32
RegEnumValueW
RegReplaceKeyW
RegDeleteKeyA
RegCreateKeyA
RegQueryValueW
RegCloseKey
RegDeleteKeyW
shlwapi
PathBuildRootA
StrFormatKBSizeA
PathRemoveArgsA
StrToInt64ExW
StrFormatKBSizeW
PathIsPrefixA
StrToIntA
StrChrA
PathIsURLW
version
VerQueryValueW
VerQueryValueA
ws2_32
WSASetEvent
WSACreateEvent
winspool.drv
ReadPrinter
DeletePrinterDataExW
FindFirstPrinterChangeNotification
ADVANCEDSETUPDIALOG
EnumPrintProcessorsW
AdvancedDocumentPropertiesA
PrinterMessageBoxW
FlushPrinter
DocumentPropertiesW
sqlunirl
_GetFileVersionInfoSize_@8
_GlobalFindAtom_@4
_PrintDlg_@4
_FindFirstFile_@8
_GetClassName_@12
_GetCharABCWidthsFloat_@16
_EnumResourceLanguages_@20
_CreateWaitableTimer_@12
Sections
.text Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.YfJRwI Size: 2KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rilsnK Size: 1024B - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.GIp Size: 3KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ZBfuS Size: 2KB - Virtual size: 275KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 163KB - Virtual size: 162KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ