Static task
static1
Behavioral task
behavioral1
Sample
d9b05da007d51cf86d4a6448d17183ab69a195436fe17b497185149676d0e77b.exe
Resource
win7-20240704-en
General
-
Target
d9b05da007d51cf86d4a6448d17183ab69a195436fe17b497185149676d0e77b
-
Size
404KB
-
MD5
6477d357280bc2ca8dfa4ff398da6062
-
SHA1
712a6f520603094d7fe889d8f4957ce7ebfe1801
-
SHA256
d9b05da007d51cf86d4a6448d17183ab69a195436fe17b497185149676d0e77b
-
SHA512
dfd6d944be1a25fd7ca1b4636a620616979d0adf395d989ba0f30eb75f47885549fff9633377bf1e1cd9a215be194717e139ed96ed876b1593d25ae5bb590d3d
-
SSDEEP
6144:IePkG7pFzb2dYC3nPbv4FNVmVeoFr9DZZtA9nO8ou6PmiDHu3JFoFtYUHGm4HJqB:IikGjzBC3bmrmRDXiDidHKjoLfHGm+O
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d9b05da007d51cf86d4a6448d17183ab69a195436fe17b497185149676d0e77b
Files
-
d9b05da007d51cf86d4a6448d17183ab69a195436fe17b497185149676d0e77b.exe windows:4 windows x86 arch:x86
d0643b4f5b029fc0e785eaae68f13e34
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42
ord5065
ord1727
ord5261
ord2446
ord2124
ord5277
ord2982
ord3147
ord3259
ord4465
ord3136
ord3262
ord2985
ord3081
ord2976
ord3830
ord3831
ord3825
ord3079
ord4080
ord4627
ord4424
ord3574
ord609
ord567
ord825
ord4275
ord2078
ord6215
ord4299
ord3573
ord1641
ord3626
ord3663
ord2414
ord6199
ord800
ord860
ord540
ord2379
ord2818
ord283
ord2754
ord1168
ord2411
ord2023
ord4218
ord2578
ord4398
ord3582
ord616
ord2080
ord3317
ord755
ord470
ord850
ord6289
ord539
ord968
ord3832
ord3315
ord1648
ord1238
ord4407
ord6741
ord6508
ord6919
ord835
ord4287
ord6613
ord6766
ord3874
ord3610
ord656
ord2089
ord5981
ord535
ord861
ord537
ord5710
ord1601
ord823
ord858
ord758
ord475
ord5647
ord3909
ord640
ord1640
ord323
ord1567
ord690
ord1988
ord5207
ord532
ord6877
ord389
ord268
ord1228
ord6084
ord1771
ord6366
ord2413
ord2024
ord4219
ord2581
ord4401
ord3639
ord3571
ord3619
ord692
ord1146
ord2450
ord6172
ord5873
ord5789
ord4083
ord1795
ord2864
ord5148
ord641
ord3499
ord2515
ord355
ord853
ord2513
ord293
ord926
ord2514
ord6569
ord1572
ord802
ord924
ord2841
ord5450
ord6394
ord2107
ord5440
ord6383
ord815
ord6375
ord4486
ord2554
ord2512
ord5731
ord3922
ord1089
ord5199
ord2396
ord3346
ord5300
ord5302
ord4079
ord4698
ord5307
ord5289
ord5714
ord3401
ord4622
ord3670
ord561
ord3952
ord2724
ord6467
ord1877
ord4249
ord2486
ord2687
ord6364
ord4472
ord5498
ord3278
ord3353
ord3749
ord446
ord743
ord1177
ord1226
ord1210
ord3530
ord2439
ord1693
ord5618
ord994
ord4342
ord4687
ord4639
ord5674
ord2156
ord4856
ord4920
ord6002
ord2137
ord1963
ord5213
ord2953
ord3868
ord5150
ord4705
ord4707
ord2876
ord5649
ord4113
ord4661
ord4660
ord4768
ord4650
ord4903
ord4548
ord4521
ord4594
ord4988
ord4925
ord4930
ord4935
ord4659
ord4909
ord4908
ord4668
ord4667
ord4666
ord4648
ord4689
ord5023
ord4654
ord4643
ord4354
ord4780
ord4649
ord4637
ord4636
ord5060
ord4584
ord4371
ord4361
ord4356
ord4739
ord4741
ord4738
ord4409
ord4603
ord5008
ord4415
ord4992
ord4979
ord2488
ord3404
ord4539
ord2954
ord2384
ord6370
ord2983
ord3148
ord3260
ord4466
ord3269
ord2986
ord3080
ord4081
ord4624
ord5825
ord3721
ord795
ord723
ord3946
ord423
ord6880
ord5314
ord5332
ord2541
ord2998
ord4949
ord324
ord2116
ord2099
ord4459
ord5033
ord6030
ord2241
ord3470
ord452
ord2795
ord6262
ord1892
ord4252
ord3326
ord6365
ord1212
ord4570
ord4672
ord4843
ord5011
ord5265
ord4376
ord4853
ord4998
ord6052
ord1775
ord6371
ord5286
ord4438
ord3279
ord4625
ord4425
ord449
ord746
ord2278
ord4713
ord5280
ord3597
ord6438
ord542
ord2370
ord2302
ord4234
ord1086
ord4710
ord2642
ord3092
ord3708
ord781
ord1085
ord6663
ord2764
ord4204
ord3771
ord6134
ord4220
ord2584
ord3654
ord2438
ord6270
ord1644
ord6136
ord3767
ord6376
ord2055
ord1176
ord1243
ord1578
ord600
ord826
ord269
ord2648
ord4441
ord4837
ord3798
ord5290
ord4353
ord6374
ord5163
ord2385
ord5241
ord4396
ord1776
ord4078
ord6055
ord2575
ord3681
ord3402
ord1576
msvcrt
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
__CxxFrameHandler
_EH_prolog
_setmbcp
_CxxThrowException
_mbscmp
sscanf
memcpy
_ftol
strcpy
memset
wcslen
rand
srand
time
??1type_info@@UAE@XZ
__dllonexit
_onexit
_exit
_controlfp
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
kernel32
LoadLibraryW
ExitProcess
GetProcAddress
GetModuleHandleA
GetStartupInfoA
lstrlenA
InterlockedDecrement
LocalFree
LocalAlloc
MultiByteToWideChar
WideCharToMultiByte
GetLastError
user32
GetSysColor
InsertMenuA
CreatePopupMenu
ActivateKeyboardLayout
EnableWindow
SendMessageA
SetCapture
ReleaseCapture
PtInRect
GetWindowRect
DrawEdge
GetCursorPos
ScreenToClient
LoadCursorA
SetCursor
CopyRect
DrawStateA
LockWindowUpdate
LoadBitmapA
OffsetRect
GetWindowLongA
GetClientRect
LoadImageA
FrameRect
InvalidateRect
DrawFrameControl
InflateRect
IsWindow
gdi32
CreateFontIndirectA
CreateCompatibleDC
CreateSolidBrush
LPtoDP
shell32
SHGetFileInfoA
ShellExecuteA
ole32
CoCreateInstance
CreateStreamOnHGlobal
CLSIDFromProgID
CLSIDFromString
CoTaskMemAlloc
OleRun
olepro32
ord251
oleaut32
SysAllocStringByteLen
GetErrorInfo
LoadRegTypeLi
SysStringByteLen
SafeArrayGetDim
SysFreeString
VariantClear
VariantInit
VariantCopy
SysAllocString
Sections
.text Size: 108KB - Virtual size: 107KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 268KB - Virtual size: 267KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ