Static task
static1
Behavioral task
behavioral1
Sample
756ea6ba4eb75011eaf54084f4cb6dc3a0aadf9ef635f82ef41fcf970a5267d7.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
756ea6ba4eb75011eaf54084f4cb6dc3a0aadf9ef635f82ef41fcf970a5267d7.exe
Resource
win10v2004-20240802-en
General
-
Target
756ea6ba4eb75011eaf54084f4cb6dc3a0aadf9ef635f82ef41fcf970a5267d7
-
Size
2.0MB
-
MD5
42d9dfae1b0e3c9f186079be620dcb70
-
SHA1
a97577e8fbf3f7ba7f137304976a5b6d2a391fd1
-
SHA256
756ea6ba4eb75011eaf54084f4cb6dc3a0aadf9ef635f82ef41fcf970a5267d7
-
SHA512
708caf045c763637dcc9c958ca800c3be1f5930fe09bb95f83dfa576608e2182645a0bfbeb86427dbb03fa1bb26b39356b660dcf23937bbfb00ccb020e5e72ac
-
SSDEEP
49152:X0Uu6/CxeorwHLvHs8tylabjXI6gpIWnMpAJ3PAuDCxakE6dgxzIhOn/rI+Lf:X0UT6Qkw7hnmIIPAs/rI+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 756ea6ba4eb75011eaf54084f4cb6dc3a0aadf9ef635f82ef41fcf970a5267d7
Files
-
756ea6ba4eb75011eaf54084f4cb6dc3a0aadf9ef635f82ef41fcf970a5267d7.exe windows:6 windows x86 arch:x86
43dbd232ca14c46707f805550c4a50d0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcmpiW
LoadLibraryExW
GetFileSizeEx
WritePrivateProfileStringW
GetTimeZoneInformation
CreateFileA
FileTimeToSystemTime
TerminateThread
GlobalAlloc
GlobalLock
SystemTimeToTzSpecificLocalTime
GlobalUnlock
GetFileTime
GetCurrentProcess
GetVersion
GetExitCodeProcess
WriteConsoleW
ReadConsoleW
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
ReadFile
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
GetFileType
SetFilePointerEx
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetTimeFormatW
GetDateFormatW
CloseHandle
FreeLibrary
GetModuleHandleExW
FreeLibraryAndExitThread
ExitThread
CreateThread
RtlUnwind
GetCPInfo
GetLocaleInfoW
LCMapStringW
CompareStringW
GetStringTypeW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
WideCharToMultiByte
OutputDebugStringW
LoadLibraryExA
VirtualFree
VirtualAlloc
FlushInstructionCache
InterlockedPushEntrySList
InterlockedPopEntrySList
EncodePointer
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetStartupInfoW
IsDebuggerPresent
IsProcessorFeaturePresent
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
WaitForSingleObjectEx
ResetEvent
SetEvent
HeapReAlloc
MultiByteToWideChar
GetModuleHandleW
GetProcessHeap
ExitProcess
DeleteCriticalSection
HeapDestroy
DecodePointer
HeapAlloc
FindResourceExW
GetStdHandle
RaiseException
HeapSize
InitializeCriticalSectionEx
GetCurrentThreadId
CreateMutexW
SizeofResource
LeaveCriticalSection
GetModuleFileNameW
GetPrivateProfileIntW
EnterCriticalSection
HeapFree
GetProcAddress
LoadLibraryW
GetLastError
SetLastError
FindResourceW
LoadResource
LockResource
CreateEventW
CreateFileW
LocalAlloc
WaitForSingleObject
WriteFile
SetEndOfFile
user32
PostMessageW
GetDC
GetPropW
SendMessageW
CallWindowProcW
GetWindowLongW
GetWindowTextW
GetParent
GetWindowRect
GetWindowTextLengthW
GetClassNameW
EnumChildWindows
GetClientRect
InvalidateRgn
IsIconic
RegisterWindowMessageW
SetWindowLongW
SetPropW
IsWindow
RemovePropW
DialogBoxParamW
BeginPaint
EndPaint
SetForegroundWindow
SetWindowTextW
MessageBoxW
GetSystemMenu
GetWindow
SetWindowPos
CheckRadioButton
MonitorFromWindow
EndDialog
GetSystemMetrics
OpenClipboard
GetDlgItemTextA
SetTimer
GetMonitorInfoW
CloseClipboard
EmptyClipboard
SetDlgItemTextW
MapWindowPoints
IsDlgButtonChecked
SetFocus
GetClipboardData
SetDlgItemTextA
SetClipboardData
GetDlgItem
AppendMenuW
KillTimer
EnableMenuItem
LoadImageW
InvalidateRect
EnableWindow
CheckDlgButton
GetLastActivePopup
DefWindowProcW
DestroyWindow
UnregisterClassW
GetActiveWindow
ShowWindow
SwitchToThisWindow
CharNextW
FindWindowW
gdi32
SetBkMode
PatBlt
GetStockObject
SetTextColor
comdlg32
GetSaveFileNameW
GetOpenFileNameW
advapi32
RegOpenKeyExW
RegSetValueExW
RegEnumKeyExW
RegCreateKeyExW
RegDeleteKeyW
RegQueryInfoKeyW
RegCloseKey
GetTokenInformation
CheckTokenMembership
CreateWellKnownSid
OpenProcessToken
RegDeleteValueW
shell32
ord680
DragQueryFileW
DragAcceptFiles
ShellExecuteExW
DragFinish
ole32
CoTaskMemAlloc
CoUninitialize
PropVariantClear
CoTaskMemRealloc
CoTaskMemFree
CoCreateInstance
CoInitialize
oleaut32
VarUI4FromStr
shlwapi
PathAppendW
PathRemoveFileSpecW
comctl32
InitCommonControlsEx
Sections
.text Size: 1.8MB - Virtual size: 1.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 87KB - Virtual size: 86KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ