Static task
static1
Behavioral task
behavioral1
Sample
155a5015e924f73466b4d2356bb724f4f4d752c04e8648a983a7d6aa72b58b23.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
155a5015e924f73466b4d2356bb724f4f4d752c04e8648a983a7d6aa72b58b23.exe
Resource
win10v2004-20240508-en
General
-
Target
155a5015e924f73466b4d2356bb724f4f4d752c04e8648a983a7d6aa72b58b23
-
Size
236KB
-
MD5
3fd784e8b037c8ae39429ea7238cc185
-
SHA1
190b9ed6dce782e79fb98228d16a9a7662e37e15
-
SHA256
155a5015e924f73466b4d2356bb724f4f4d752c04e8648a983a7d6aa72b58b23
-
SHA512
585ee20bcd5a46e7bf0b3fbf4d9c3cbb8287c2ca65ca8c134211a9689f48b06b831de4376e4abeb3ba1a87d85c5349e9c11e50cbbdd2ce6fc43a245bb28ca9d8
-
SSDEEP
3072:QpeCvzAoWKwmG9eA7TDaxyu6GgSVz2MA82cdMfXNjke28Y0sBUdwQZUV1laQFbkO:QpeEhWfm4eA/DaQu6cZc832lj3T69
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 155a5015e924f73466b4d2356bb724f4f4d752c04e8648a983a7d6aa72b58b23
Files
-
155a5015e924f73466b4d2356bb724f4f4d752c04e8648a983a7d6aa72b58b23.exe windows:4 windows x86 arch:x86
0c1323ee8270d72760805b2f452d7d31
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42
ord858
ord6282
ord4202
ord537
ord2621
ord1134
ord686
ord715
ord693
ord1168
ord2582
ord6055
ord1776
ord4402
ord5290
ord3370
ord3640
ord1146
ord860
ord567
ord415
ord384
ord2370
ord2302
ord3571
ord3626
ord4277
ord2764
ord2818
ord2862
ord2414
ord2096
ord2379
ord755
ord470
ord1200
ord2652
ord1669
ord6334
ord6907
ord3998
ord4129
ord5683
ord3452
ord2515
ord815
ord3499
ord5605
ord1979
ord6385
ord665
ord5186
ord354
ord941
ord1081
ord823
ord5442
ord5651
ord3127
ord3616
ord3663
ord3318
ord2393
ord350
ord1567
ord2803
ord353
ord268
ord535
ord2642
ord4220
ord2584
ord3654
ord2438
ord6270
ord2863
ord3302
ord3301
ord4204
ord939
ord1641
ord1997
ord5465
ord798
ord5194
ord533
ord6283
ord1644
ord561
ord3738
ord4424
ord4622
ord5714
ord5289
ord5307
ord4698
ord4079
ord2725
ord5302
ord5300
ord3346
ord2396
ord5199
ord1089
ord3922
ord5731
ord2512
ord2554
ord4486
ord6375
ord4274
ord4673
ord4160
ord6199
ord2614
ord3092
ord3874
ord4853
ord4234
ord800
ord825
ord324
ord540
ord641
ord3597
ord4425
ord4627
ord4080
ord3079
ord3825
ord3831
ord3830
ord2976
ord3081
ord2985
ord3262
ord3136
ord4465
ord3259
ord3147
ord2982
ord5277
ord2124
ord2446
ord5261
ord1727
ord5065
ord3749
ord6376
ord2055
ord2648
ord4441
ord4837
ord3798
ord5280
ord4353
ord6374
ord5163
ord2385
ord5241
ord4407
ord1775
ord4078
ord6052
ord2514
ord4710
ord4998
ord4376
ord355
ord5265
ord1576
msvcrt
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
??1type_info@@UAE@XZ
_onexit
__dllonexit
calloc
fputc
fclose
fread
_setmbcp
_strlwr
_stricmp
__CxxFrameHandler
memset
memcpy
atoi
strstr
_mbscmp
_mbsicmp
strcat
realloc
free
_controlfp
strlen
atol
strcpy
isdigit
malloc
strtok
printf
rename
fwrite
_errno
fopen
_fdopen
ftell
kernel32
DeleteFileA
CreateDirectoryA
GetModuleFileNameA
lstrlenA
OutputDebugStringA
FindResourceA
lstrcmpiA
GetCurrentProcess
FindClose
FindFirstFileA
lstrcpynA
GetExitCodeProcess
CreateProcessA
FreeLibrary
GetProcAddress
LoadLibraryA
lstrcpyA
FindNextFileA
RemoveDirectoryA
lstrcmpA
WritePrivateProfileStringA
MoveFileExA
GlobalFree
GlobalAlloc
ReadFile
GetFileSize
WriteFile
SetFilePointer
MoveFileA
GetModuleHandleA
GetStartupInfoA
SetFileAttributesA
CopyFileA
lstrcatA
GetTempPathA
EndUpdateResourceA
UpdateResourceA
GetLastError
BeginUpdateResourceA
LockResource
SizeofResource
LoadResource
GetVersionExA
Sleep
GetWindowsDirectoryA
WinExec
CloseHandle
GetFileTime
CreateFileA
SetFileTime
WideCharToMultiByte
LocalFree
FormatMessageA
GetSystemDirectoryA
OpenProcess
TerminateProcess
user32
PostMessageA
UpdateWindow
LoadBitmapA
GetMessagePos
GetSubMenu
KillTimer
IsIconic
GetSystemMetrics
GetClientRect
DrawIcon
GetSysColor
GetWindowRect
LoadMenuA
MessageBoxA
LoadStringA
wsprintfA
SetTimer
LoadIconA
SendMessageA
EnableWindow
CharUpperA
gdi32
GetBitmapDimensionEx
advapi32
LookupPrivilegeValueA
QueryServiceStatus
GetTokenInformation
AllocateAndInitializeSid
EqualSid
LookupAccountSidA
FreeSid
OpenProcessToken
CloseServiceHandle
AdjustTokenPrivileges
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
StartServiceA
OpenSCManagerA
OpenServiceA
shell32
SHGetPathFromIDListA
SHBrowseForFolderA
comctl32
ImageList_SetBkColor
ImageList_AddMasked
Sections
.text Size: 64KB - Virtual size: 62KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 136KB - Virtual size: 135KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ