Static task
static1
Behavioral task
behavioral1
Sample
85d0b0f199f7b639853881cd0ee7911fa0c242d5f8b4e6036b0da5dfac6334a0.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
85d0b0f199f7b639853881cd0ee7911fa0c242d5f8b4e6036b0da5dfac6334a0.exe
Resource
win10v2004-20240412-en
General
-
Target
85d0b0f199f7b639853881cd0ee7911fa0c242d5f8b4e6036b0da5dfac6334a0
-
Size
2.1MB
-
MD5
f8fc204695e440474646cc0240c307dd
-
SHA1
77716f173b3a32ac800a944b846882c014964764
-
SHA256
85d0b0f199f7b639853881cd0ee7911fa0c242d5f8b4e6036b0da5dfac6334a0
-
SHA512
5a74d72762823e5ebb7e9672588782589c0c107123ccf1343b62d289367cc73e114c2df083187a6ddfa4d53dfcabfac310840fb709c51db40fb69af268ef70a6
-
SSDEEP
49152:LhiHFrothLlclmJSVARa86xzW3xRoyqqxrT:0roPlclWSV7Sxyqxr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 85d0b0f199f7b639853881cd0ee7911fa0c242d5f8b4e6036b0da5dfac6334a0
Files
-
85d0b0f199f7b639853881cd0ee7911fa0c242d5f8b4e6036b0da5dfac6334a0.exe windows:4 windows x86 arch:x86
a8f69eb2cf9f30ea96961c86b4347282
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
msvcrt
memset
memcpy
_stricmp
strncmp
_strnicmp
strcmp
memmove
strlen
strcpy
strcat
strncpy
kernel32
GetModuleHandleA
HeapCreate
HeapDestroy
ExitProcess
GetCurrentThreadId
GetTickCount
HeapAlloc
HeapFree
WriteFile
CloseHandle
CreateFileA
GetFileSize
ReadFile
SetFilePointer
InitializeCriticalSection
GetModuleFileNameA
GetCurrentProcess
DuplicateHandle
CreatePipe
GetStdHandle
CreateProcessA
WaitForSingleObject
EnterCriticalSection
LeaveCriticalSection
GetCurrentProcessId
GetDriveTypeA
FindFirstFileA
FindClose
GetFileAttributesA
CreateDirectoryA
GetLastError
FindNextFileA
SetFileAttributesA
HeapReAlloc
comctl32
InitCommonControls
user32
MessageBoxA
GetWindowThreadProcessId
IsWindowVisible
IsWindowEnabled
GetForegroundWindow
EnableWindow
EnumWindows
shell32
ShellExecuteExA
ole32
CoInitialize
Sections
.code Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 6KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.NewSec Size: - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.htext Size: 52KB - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE