Static task
static1
Behavioral task
behavioral1
Sample
a1781cc69c01479e486be4db86cf03ce655867cb9904be8629d2b361f25626cf.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
a1781cc69c01479e486be4db86cf03ce655867cb9904be8629d2b361f25626cf.exe
Resource
win10v2004-20240611-en
General
-
Target
a1781cc69c01479e486be4db86cf03ce655867cb9904be8629d2b361f25626cf
-
Size
562KB
-
MD5
9c418aa9aaa796741c2f8faeda7f5cc2
-
SHA1
ae1058bad33570485ff3c0802d9fb405e0cf3a4d
-
SHA256
a1781cc69c01479e486be4db86cf03ce655867cb9904be8629d2b361f25626cf
-
SHA512
38c42f43185c270ffa44f2662f978ae376f60adb3ae7c0ae063c89453a8a2f178da9583cd5ed2003db351e149905b2e7c9f00ebe89fa3772d628ba539b954cd7
-
SSDEEP
6144:KvnLS3UWeltpM38B2vG+AbUotvATqdiV830l6hRw0HaVg0VWu:2LS3DgOFA9r0630l6hRw0HaVg0w
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a1781cc69c01479e486be4db86cf03ce655867cb9904be8629d2b361f25626cf
Files
-
a1781cc69c01479e486be4db86cf03ce655867cb9904be8629d2b361f25626cf.exe windows:4 windows x86 arch:x86
cba0f0988ae9bc404a0a4855c57e385b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
fp30utl
ord238
ord891
ord1014
ord233
ord112
ord55
ord195
ord783
ord543
ord121
ord255
ord349
ord1218
ord115
ord740
ord350
ord967
ord965
ord964
ord744
ord745
ord738
ord1168
ord1128
ord1114
ord1217
ord1016
ord1197
ord722
fp30cutl
ord210
ord322
ord308
ord52
ord27
ord388
ord335
ord362
ord449
ord391
ord18
ord73
ord434
ord9
ord257
ord189
ord34
ord169
ord29
ord436
ord445
ord260
ord40
ord219
ord291
ord342
ord203
ord448
ord16
ord95
ord94
ord299
ord258
ord405
ord259
ord31
ord6
ord394
ord429
ord433
ord427
ord444
ord455
ord155
ord373
ord417
ord399
ord141
ord177
ord377
ord45
ord61
ord182
ord386
ord387
ord442
ord33
ord307
ord47
ord201
ord347
ord350
ord8
ord68
ord109
ord302
ord83
ord78
ord303
ord355
ord327
ord326
ord325
ord105
ord87
ord389
ord2
ord1
mfc42
ord1148
ord4275
ord3706
ord3619
ord2243
ord4465
ord5714
ord3136
ord3259
ord4079
ord5302
ord5300
ord3346
ord2396
ord5199
ord1089
ord3922
ord5731
ord2512
ord2554
ord4486
ord6375
ord4673
ord289
ord2860
ord613
ord4376
ord4853
ord2859
ord4299
ord4710
ord324
ord6383
ord5440
ord6394
ord5450
ord1146
ord2864
ord2452
ord470
ord5787
ord5788
ord5789
ord6453
ord1768
ord3692
ord4033
ord2571
ord2754
ord4047
ord5289
ord2725
ord4202
ord6282
ord6283
ord1205
ord2621
ord4159
ord561
ord4274
ord293
ord2513
ord2380
ord326
ord656
ord3610
ord535
ord5683
ord1669
ord2652
ord765
ord3698
ord1200
ord2086
ord6215
ord1134
ord815
ord3738
ord5265
ord4998
ord2514
ord6052
ord1775
ord5280
ord4425
ord3597
ord2411
ord2023
ord4218
ord2578
ord4398
ord3582
ord2575
ord4396
ord3574
ord6055
ord4078
ord1776
ord4407
ord5241
ord2385
ord5163
ord6374
ord4353
ord5290
ord3798
ord4837
ord4441
ord2648
ord2055
ord6376
ord3749
ord5065
ord1727
ord5261
ord2446
ord2124
ord5277
ord2982
ord3147
ord1641
ord5791
ord801
ord3262
ord2985
ord3081
ord2976
ord3402
ord3830
ord3831
ord3825
ord3079
ord4080
ord4627
ord4424
ord3721
ord567
ord825
ord641
ord616
ord609
ord795
ord2358
ord2298
ord2302
ord800
ord4160
ord540
ord1175
ord2642
ord6334
ord2379
ord537
ord1168
ord2818
ord2301
ord941
ord858
ord860
ord2370
ord5651
ord3130
ord3676
ord3663
ord2614
ord5575
ord4277
ord5861
ord4129
ord2763
ord6143
ord541
ord2141
ord350
ord434
ord5981
ord3092
ord1199
ord1147
ord922
ord6199
ord4622
ord924
ord939
ord4278
ord3626
ord4234
ord5307
ord4698
ord2244
ord472
ord283
ord823
ord2414
ord1576
ord3693
ord4133
ord755
ord940
ord2764
ord5875
ord4297
ord6170
ord6172
ord5781
msvcrt
_setmbcp
sscanf
_mbscmp
atoi
strcpy
memcpy
memset
setlocale
_purecall
_mbsicmp
_unlink
fclose
fopen
floor
_ftol
__dllonexit
_onexit
_exit
_XcptFilter
exit
__p__acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
kernel32
DeleteFileA
GetStartupInfoA
GetModuleHandleA
GetTempFileNameA
GetModuleFileNameA
GlobalFree
CreateFileMappingA
GetLastError
GlobalLock
GlobalUnlock
IsDBCSLeadByte
user32
LoadStringA
InflateRect
DrawFrameControl
GetSysColor
BringWindowToTop
SetRect
CopyRect
LoadIconA
MessageBoxA
GetWindowRect
IsWindow
GetDesktopWindow
GetWindowDC
ReleaseDC
GetCursorPos
ScreenToClient
LoadCursorA
SetCursor
PtInRect
ReleaseCapture
SetCapture
GetClientRect
FillRect
InvalidateRect
EnableWindow
SendMessageA
FrameRect
GetNextDlgTabItem
GetKeyState
GetClassNameA
TranslateAcceleratorA
GetActiveWindow
GetFocus
LoadAcceleratorsA
PeekMessageA
PostQuitMessage
DrawIcon
GetSystemMetrics
IsIconic
gdi32
GetCurrentPositionEx
RealizePalette
GetDeviceCaps
CreateSolidBrush
CreateRectRgnIndirect
GetTextExtentPointA
CreatePen
SelectObject
comctl32
ord17
Sections
.text Size: 57KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 501KB - Virtual size: 500KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ