Static task
static1
Behavioral task
behavioral1
Sample
ad1f9bc23788d2007c0247c34799fe8ce9ed5aabf15cdc83b4eb53633047b85b.exe
Resource
win7-20241023-en
General
-
Target
ad1f9bc23788d2007c0247c34799fe8ce9ed5aabf15cdc83b4eb53633047b85b
-
Size
360KB
-
MD5
1162b61ae0ac42b76c072c32dad49910
-
SHA1
57fc8e4b27144e91cc1c6c5998d1d89c06bfe1ac
-
SHA256
ad1f9bc23788d2007c0247c34799fe8ce9ed5aabf15cdc83b4eb53633047b85b
-
SHA512
23136933d5d9e8c9f8d780c40a67db9128e3437d66e9d9f5f74b59127477538c293191a5e26e5f86dc9badda8958c76512cc41e119f750b0127d198fda6a0a31
-
SSDEEP
6144:T9RXIdVdeqPUa51VU5qiHorWQABLsd4s:T9R4j0qPUa5bQorWQABLbs
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource ad1f9bc23788d2007c0247c34799fe8ce9ed5aabf15cdc83b4eb53633047b85b
Files
-
ad1f9bc23788d2007c0247c34799fe8ce9ed5aabf15cdc83b4eb53633047b85b.exe windows:4 windows x86 arch:x86
c9f7e018b269f1b5fe81cf757d6f8e93
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WinExec
LoadLibraryA
GetProcAddress
WriteFile
GlobalReAlloc
GlobalSize
GetPrivateProfileStringA
WritePrivateProfileStringA
CreateFileA
SetFilePointer
ReadFile
CloseHandle
GlobalAlloc
VirtualAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetModuleHandleExA
GetModuleHandleA
GetStartupInfoA
user32
GetMenu
GetDlgItem
CharLowerA
DestroyWindow
ShowWindow
WinHelpA
DefFrameProcA
EnableMenuItem
GetParent
DefMDIChildProcA
EndDialog
CharUpperA
ReleaseDC
GetDC
SendMessageA
InvalidateRect
PostQuitMessage
SendDlgItemMessageA
wsprintfA
SetWindowPos
GetClientRect
SetScrollRange
SetScrollPos
LoadStringA
EndPaint
BeginPaint
DispatchMessageA
TranslateMessage
GetMessageA
CreateDialogParamA
UpdateWindow
CreateWindowExA
RegisterClassA
LoadCursorA
DialogBoxParamA
LoadIconA
gdi32
CreatePalette
DeleteObject
SelectObject
RealizePalette
SelectPalette
SaveDC
SetWindowOrgEx
RestoreDC
LineTo
MoveToEx
DPtoLP
Rectangle
SetROP2
SetViewportExtEx
SetWindowExtEx
SetMapMode
CreatePen
GetStockObject
DeleteDC
BitBlt
CreateCompatibleDC
CreateDIBitmap
comdlg32
GetSaveFileNameA
GetOpenFileNameA
msvcp60
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@0@Z
??6std@@YAAAV?$basic_ostream@DU?$char_traits@D@std@@@0@AAV10@PBD@Z
?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A
?endl@std@@YAAAV?$basic_ostream@DU?$char_traits@D@std@@@1@AAV21@@Z
??1_Winit@std@@QAE@XZ
??0_Winit@std@@QAE@XZ
??1Init@ios_base@std@@QAE@XZ
??0Init@ios_base@std@@QAE@XZ
msvcrt
_except_handler3
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
_onexit
__dllonexit
sprintf
_ftol
strncpy
strncmp
calloc
memset
strcpy
strlen
strcmp
memcpy
malloc
__set_app_type
_controlfp
Sections
.text Size: 44KB - Virtual size: 41KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 270B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 8.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 268KB - Virtual size: 265KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ