Static task
static1
Behavioral task
behavioral1
Sample
78061045ecb827b375f929fd0145c9eaa37e9ff3d6553177b8536d7270e3a4a1.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
78061045ecb827b375f929fd0145c9eaa37e9ff3d6553177b8536d7270e3a4a1.exe
Resource
win10v2004-20241007-en
General
-
Target
78061045ecb827b375f929fd0145c9eaa37e9ff3d6553177b8536d7270e3a4a1
-
Size
2.7MB
-
MD5
4c0d16620e0e657c69ea84fa04834bef
-
SHA1
2f397affaa12d4fd8098c98fe252c03f15fc36cc
-
SHA256
78061045ecb827b375f929fd0145c9eaa37e9ff3d6553177b8536d7270e3a4a1
-
SHA512
c98cdfd133627c7854399593161d595b64286beaddff621a5f7b4ba82bb60fbc27c5e6f8524d88f02cb2a95c0f811368d8432e1d29eeea093046255abc88d083
-
SSDEEP
49152:u3DAuMiyffEGH8ox5KpLvPtmZXHM2s+Qh7SbU6MCWxiqixh:u3EPikfEGHjcvloXHM2s+Qh7kU6F
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 78061045ecb827b375f929fd0145c9eaa37e9ff3d6553177b8536d7270e3a4a1
Files
-
78061045ecb827b375f929fd0145c9eaa37e9ff3d6553177b8536d7270e3a4a1.exe windows:4 windows x86 arch:x86
906591e0615083cfbe833492803f4089
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
TerminateThread
Sleep
GetTickCount
GetACP
GetOEMCP
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetLastError
GetSystemDefaultLCID
GetVersion
TerminateThread
GetExitCodeThread
WaitForSingleObject
Sleep
CloseHandle
GetSystemTimeAsFileTime
IsBadReadPtr
GetCurrentThreadId
GetCurrentProcessId
EnterCriticalSection
InitializeCriticalSection
HeapFree
GetProcessHeap
HeapAlloc
DeviceIoControl
LocalFree
CreateFileA
LocalAlloc
InterlockedDecrement
InterlockedCompareExchange
CreateMutexA
ReleaseMutex
FormatMessageA
GetLastError
GetVolumeInformationA
GetEnvironmentVariableA
CreateThread
GetProcAddress
LoadLibraryA
TlsSetValue
TlsGetValue
TlsAlloc
SystemTimeToFileTime
GetSystemTime
FileTimeToSystemTime
GetCurrentProcess
TlsFree
GetModuleHandleA
ReadFile
WriteFile
GetFileSize
FindClose
GetLocalTime
SetErrorMode
FindFirstFileA
FindNextFileA
GetModuleFileNameA
InterlockedIncrement
HeapReAlloc
SearchPathA
CreateSemaphoreA
OpenSemaphoreA
ReleaseSemaphore
LeaveCriticalSection
DeleteCriticalSection
FreeLibrary
GetVersion
GetModuleHandleA
GetProcAddress
CreateFileW
msvcrt
strncmp
setupapi
SetupDiEnumDeviceInfo
advapi32
GetUserNameA
RegEnumKeyW
comctl32
InitCommonControlsEx
InitCommonControlsEx
user32
IsWindow
ShowWindow
GetClassNameA
GetWindowThreadProcessId
GetWindow
SetWindowPos
GetDlgItem
UpdateWindow
SetWindowTextW
GetWindowTextW
GetClientRect
GetWindowRect
SendMessageA
EnumWindows
GetDesktopWindow
MessageBoxW
GetWindowLongA
SetWindowLongA
DefWindowProcA
MessageBoxA
IsRectEmpty
hasp_windows_107479
ord3
gdi32
OffsetViewportOrgEx
comdlg32
GetFileTitleW
winspool.drv
DocumentPropertiesW
shell32
ShellExecuteW
shlwapi
PathFindFileNameW
oledlg
OleUIBusyW
ole32
CLSIDFromString
oleaut32
SysAllocString
Sections
.text Size: 208KB - Virtual size: 205KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 56KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 384KB - Virtual size: 382KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.protect Size: 2.1MB - Virtual size: 2.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE