Static task
static1
Behavioral task
behavioral1
Sample
78bf92d34075ecbb31071c25d44fb5da431480f46eec5f6091b8a10249bf170a.exe
Resource
win7-20240903-en
General
-
Target
78bf92d34075ecbb31071c25d44fb5da431480f46eec5f6091b8a10249bf170a
-
Size
312KB
-
MD5
3719a155b27c690830d28bd3dc29b034
-
SHA1
ec47bcf610df5001ec5b7a313ac7c6e10600f9bb
-
SHA256
78bf92d34075ecbb31071c25d44fb5da431480f46eec5f6091b8a10249bf170a
-
SHA512
26ee3bdbde296f6f5cb2f28d7868a678abe35adb19e3e3a762e275a8cdd828eab965db1278afc7b67f5f72c32a04efb6f287b6b89960dbec0f5ff898a8569702
-
SSDEEP
3072:8p3aW/1n8xO32P1TdtJgqHXvAusfQatOCgMxfkP7+tRJ5tiGGakX3SGFiuo2omD:8YI8k32P1ptJgOAdCufYc5tZACIo
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 78bf92d34075ecbb31071c25d44fb5da431480f46eec5f6091b8a10249bf170a
Files
-
78bf92d34075ecbb31071c25d44fb5da431480f46eec5f6091b8a10249bf170a.exe windows:4 windows x86 arch:x86
da661a069d6921486b13e33805190797
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapFree
HeapAlloc
VirtualAlloc
HeapReAlloc
GetCommandLineA
GetProcessHeap
GetStartupInfoA
RaiseException
RtlUnwind
HeapSize
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetACP
LCMapStringA
LCMapStringW
Sleep
HeapDestroy
HeapCreate
VirtualFree
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
GetStringTypeA
GetStringTypeW
GetConsoleCP
GetConsoleMode
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetErrorMode
CreateFileA
GetCurrentProcess
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
WritePrivateProfileStringA
GetThreadLocale
GetOEMCP
GetCPInfo
InterlockedIncrement
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GlobalFlags
InterlockedDecrement
GetModuleFileNameW
GetCurrentProcessId
GetCurrentThread
ConvertDefaultLocale
GetModuleFileNameA
EnumResourceLanguagesA
GetLocaleInfoA
lstrcmpA
GlobalFree
GlobalAlloc
FormatMessageA
LocalFree
CloseHandle
FreeResource
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
FreeLibrary
LoadLibraryA
lstrcmpW
GetVersionExA
GlobalLock
GlobalUnlock
MulDiv
GetModuleHandleA
GetProcAddress
SetLastError
GetVersion
CompareStringA
GetLastError
InterlockedExchange
MultiByteToWideChar
lstrlenA
ExitProcess
FindResourceA
LoadResource
LockResource
SizeofResource
WideCharToMultiByte
user32
SetCursor
GetDesktopWindow
CreateDialogIndirectParamA
GetNextDlgTabItem
EndDialog
PostQuitMessage
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetMenuState
GetMessageA
TranslateMessage
GetActiveWindow
ValidateRect
ShowWindow
MoveWindow
IsDialogMessageA
WindowFromPoint
IsWindowEnabled
RegisterWindowMessageA
SendDlgItemMessageA
WinHelpA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
SetFocus
GetWindowTextLengthA
GetForegroundWindow
SetActiveWindow
DispatchMessageA
GetDlgItem
GetTopWindow
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
GetKeyState
SetForegroundWindow
IsWindowVisible
UpdateWindow
GetMenu
GetSubMenu
GetMenuItemID
GetMenuItemCount
MessageBoxA
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
CopyRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
IsWindow
RedrawWindow
SetTimer
GetSysColor
OffsetRect
KillTimer
GetWindowLongA
SetWindowLongA
SetWindowPos
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
GetWindow
EndPaint
BeginPaint
ReleaseDC
GetDC
UnregisterClassA
LoadCursorA
GetSysColorBrush
DestroyMenu
GetWindowThreadProcessId
GetWindowTextA
PtInRect
SetCapture
GetCapture
ReleaseCapture
InflateRect
GetCursorPos
GetFocus
SetWindowTextA
SendMessageA
GetParent
IsRectEmpty
GetClientRect
PostMessageA
EnableWindow
LoadIconA
GetSystemMenu
AppendMenuA
IsIconic
ClientToScreen
ScreenToClient
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
DrawIcon
GetSystemMetrics
GetLastActivePopup
gdi32
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
CreateBitmap
GetStockObject
ScaleViewportExtEx
GetDeviceCaps
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetObjectA
DeleteObject
MoveToEx
LineTo
GetClipBox
SetMapMode
SetTextColor
SetBkMode
SetBkColor
RestoreDC
SaveDC
CreateCompatibleBitmap
CreateCompatibleDC
GetTextExtentPoint32A
CreatePen
BitBlt
SetPixel
GetCurrentObject
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
RegSetValueExA
RegCreateKeyExA
RegQueryValueA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyExA
RegQueryValueExA
RegOpenKeyA
RegCloseKey
shell32
SHGetPathFromIDListA
SHGetMalloc
SHBrowseForFolderA
shlwapi
PathFindFileNameA
PathFindExtensionA
oleaut32
VariantClear
VariantChangeType
VariantInit
Sections
.text Size: 168KB - Virtual size: 167KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 40KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 88KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ