Static task
static1
Behavioral task
behavioral1
Sample
d394d7accff93a1ab11d6573a93ae5c7.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d394d7accff93a1ab11d6573a93ae5c7.exe
Resource
win10v2004-20231215-en
General
-
Target
d394d7accff93a1ab11d6573a93ae5c7
-
Size
143KB
-
MD5
d394d7accff93a1ab11d6573a93ae5c7
-
SHA1
89a5218fc4237faa2ce05a471f5dffca4c30edc3
-
SHA256
b08fadf19d957b267cf832b62fd39a59033759fafb6e4c7e70564b29dfe6ba44
-
SHA512
dfb0ed77fd06b5d7c78af5e2400dc6c80c85de24c639bb47dd997860e1cbf7bdf019d06ab8756ac8b6ff2f574a233278b0109592df4153211be460c2feb62867
-
SSDEEP
3072:6tS3DGNvm/cvcHmFdpEmTtx9JIneyshuLveA2rfsD/05aq5GKQ2tRG:ieH/scHcpl6sRABD8DYK
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d394d7accff93a1ab11d6573a93ae5c7
Files
-
d394d7accff93a1ab11d6573a93ae5c7.exe windows:5 windows x86 arch:x86
98deca180e6e5dbbb0132be398c8160a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
ScreenToClient
WaitMessage
IsWindow
GetSystemMenu
DestroyMenu
DestroyCaret
GetWindowThreadProcessId
CharLowerBuffA
GetMenuStringW
EnumClipboardFormats
EmptyClipboard
SetScrollInfo
UnregisterClassW
TranslateMDISysAccel
EnableMenuItem
IsChild
GetTopWindow
GetWindowPlacement
GetWindow
SetMenu
SetWindowTextA
InsertMenuItemA
ScrollDC
SetCursor
EnumChildWindows
GetUpdateRect
EnumWindows
IsWindowUnicode
GetMessageTime
ChildWindowFromPoint
WindowFromPoint
CreateIconIndirect
GetLastActivePopup
GetWindowTextA
ScrollWindow
DestroyIcon
NotifyWinEvent
GetClassInfoA
DefWindowProcW
DispatchMessageA
DrawTextW
GetClassNameA
ShowWindow
LoadBitmapA
EnableScrollBar
CreateWindowExA
kernel32
GetFullPathNameA
VirtualFree
WaitForMultipleObjects
CreateFileMappingA
UnmapViewOfFile
GetWindowsDirectoryA
SetThreadPriority
CreateEventA
VirtualQueryEx
GlobalAlloc
GetFileAttributesA
TerminateProcess
MapViewOfFileEx
OpenFileMappingA
GlobalAddAtomA
DeleteCriticalSection
GetModuleHandleA
FlushInstructionCache
CloseHandle
MoveFileA
GetFileSize
CreateMutexA
GlobalFree
TerminateThread
lstrcmpA
MulDiv
SetThreadLocale
FreeResource
lstrlenW
TryEnterCriticalSection
GetACP
GetExitCodeProcess
GetDateFormatA
SetLastError
SleepEx
CompareStringA
oleaut32
SysAllocStringByteLen
SafeArrayGetElement
SafeArrayGetUBound
GetActiveObject
SafeArrayPutElement
SafeArrayPtrOfIndex
SafeArrayUnaccessData
VariantInit
gdi32
GetDIBColorTable
CreatePalette
CombineRgn
StartDocA
Polygon
GetCharWidthA
SetTextCharacterExtra
Polyline
ExtCreatePen
GetClipRgn
GetCurrentObject
CreatePen
SetMapMode
SetPixelV
SetRectRgn
GetBrushOrgEx
TextOutA
BitBlt
SelectObject
GetBkColor
CreateDCA
ifmocns4
_Toupper
_LSnan
_Dtest
_FXbig
_Rteps
_LRteps
_FExp
_LInf
_FSinh
_LPoly
comctl32
ImageList_GetImageCount
ImageList_GetDragImage
ImageList_Replace
InitCommonControls
ImageList_Destroy
advapi32
RegQueryInfoKeyA
RegDeleteValueA
shell32
ShellExecuteExA
SHGetDesktopFolder
DragQueryPoint
wininet
InternetReadFile
imm32
ImmGetCompositionStringA
ole32
CoGetClassObject
OleSetClipboard
ProgIDFromCLSID
OleDraw
comdlg32
GetSaveFileNameA
Sections
.text Size: 115KB - Virtual size: 116KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 21KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ