Static task
static1
Behavioral task
behavioral1
Sample
072f29d8447427f4485e5442d2b168dbe183d2494bae2b74369bdf05118eb690.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
072f29d8447427f4485e5442d2b168dbe183d2494bae2b74369bdf05118eb690.exe
Resource
win10v2004-20240508-en
General
-
Target
072f29d8447427f4485e5442d2b168dbe183d2494bae2b74369bdf05118eb690.exe
-
Size
363KB
-
MD5
47e16accdefa73a79c924e03108b9800
-
SHA1
387c39fb0124c47c70d73d8557d14adef1a753be
-
SHA256
072f29d8447427f4485e5442d2b168dbe183d2494bae2b74369bdf05118eb690
-
SHA512
60d00afcd9d45f7cb259391cd0392b9b5e707db25954618dc910896aa3283ca2a5133cafe6f799629d4200ba16842dbece2182f6df611774a3fe4cbaf8e064b8
-
SSDEEP
6144:Vt4ie9zFSB4M+F5S8uojEav1OAg0K2GLuZ5Uvpzw:Vt4N9zFSl+LFuogav1hu6Z5gpzw
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 072f29d8447427f4485e5442d2b168dbe183d2494bae2b74369bdf05118eb690.exe
Files
-
072f29d8447427f4485e5442d2b168dbe183d2494bae2b74369bdf05118eb690.exe.exe windows:5 windows x86 arch:x86
1496a29322cfb064a51eab67cf351173
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
OemToCharBuffA
DdeSetQualityOfService
CreateAcceleratorTableA
DdeReconnect
LoadCursorW
GetLastActivePopup
LoadImageW
DdeCreateStringHandleW
EndDeferWindowPos
MessageBoxExA
MessageBoxA
TranslateMessage
SetWindowLongA
PeekMessageA
MsgWaitForMultipleObjects
LoadStringA
ExitWindowsEx
DispatchMessageA
DestroyWindow
CreateWindowExA
CallWindowProcA
CharPrevA
advapi32
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
comctl32
ord17
kernel32
GetStringTypeW
LCMapStringW
LCMapStringA
FlushFileBuffers
GetConsoleMode
GetOEMCP
GetCPInfo
GetCurrentProcessId
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetStringTypeA
GetLastError
CreateDirectoryA
CreateProcessA
DeleteFileA
FindResourceA
FormatMessageA
GetACP
GetCurrentProcess
GetEnvironmentVariableA
GetExitCodeProcess
GetFileAttributesA
GetFullPathNameA
GetLocaleInfoA
GetModuleFileNameA
GetProcAddress
GetSystemDefaultLCID
GetSystemInfo
GetUserDefaultLangID
GetVersionExA
GetWindowsDirectoryA
IsDBCSLeadByte
LoadLibraryA
LoadResource
LockResource
RemoveDirectoryA
SetErrorMode
SetLastError
SizeofResource
Sleep
VirtualProtect
VirtualQuery
CloseHandle
CreateFileA
ExitProcess
GetFileType
GetSystemTime
GetFileSize
GetStdHandle
RaiseException
ReadFile
RtlUnwind
SetEndOfFile
SetFilePointer
WriteFile
GetCommandLineA
GetModuleHandleA
MultiByteToWideChar
TlsGetValue
TlsSetValue
WideCharToMultiByte
LocalAlloc
LocalFree
VirtualAlloc
VirtualFree
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeSListHead
IsValidLocale
GetDefaultCommConfigW
GetConsoleCP
SetWaitableTimer
EnumCalendarInfoExW
GetPrivateProfileIntA
GetStartupInfoA
GetSystemTimeAsFileTime
OutputDebugStringA
HeapAlloc
HeapFree
HeapReAlloc
GetTimeZoneInformation
GetModuleHandleW
TlsAlloc
TlsFree
InterlockedIncrement
InterlockedDecrement
GetCurrentThreadId
LoadLibraryExA
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
HeapDestroy
HeapCreate
QueryPerformanceCounter
GetTickCount
Sections
.text Size: 117KB - Virtual size: 117KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 42KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 38KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 163KB - Virtual size: 163KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ