Static task
static1
Behavioral task
behavioral1
Sample
535a1981f7a3cae68df3ee1fa7569e93ef3497f2e26c81e4638bfdffa06b738e.exe
Resource
win7-20240903-en
General
-
Target
535a1981f7a3cae68df3ee1fa7569e93ef3497f2e26c81e4638bfdffa06b738e
-
Size
80KB
-
MD5
37b63a9aa08a645d62157eaffd5e817f
-
SHA1
040df34f8ae271f22c894ad1f328017697d43584
-
SHA256
535a1981f7a3cae68df3ee1fa7569e93ef3497f2e26c81e4638bfdffa06b738e
-
SHA512
781710122eef555a2507b909561d52b8fe40670226522e87b0cfb6cc68f6aa97739558351319ad04bf7dc3236f37dc28a9a80ac5e26e8897060a6fb46a6b06dc
-
SSDEEP
1536:fHB0UxMkzOt7HcvJGt5AdHIOWnToIf12ZXPGCq2iW7z:fhAWJGSCTBf12ZfGCH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 535a1981f7a3cae68df3ee1fa7569e93ef3497f2e26c81e4638bfdffa06b738e
Files
-
535a1981f7a3cae68df3ee1fa7569e93ef3497f2e26c81e4638bfdffa06b738e.exe windows:4 windows x86 arch:x86
a8070c6ad7600bbdd417216375913d93
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
CreatePropertySheetPageA
PropertySheetA
kernel32
GetTempFileNameA
GetTempPathA
GetModuleHandleA
ResumeThread
SetPriorityClass
GetCurrentProcess
GetCurrentThread
SetThreadPriority
CreateProcessA
GetModuleFileNameA
DeleteFileA
RemoveDirectoryA
GetPrivateProfileIntA
GetPrivateProfileStringA
SetLastError
CreateDirectoryA
GetFileAttributesA
GetFileSize
CreateFileA
CreateFileMappingA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetStartupInfoA
InterlockedCompareExchange
Sleep
InterlockedExchange
CloseHandle
SetFileTime
DosDateTimeToFileTime
GetLastError
FormatMessageA
LocalFree
FreeLibrary
MultiByteToWideChar
LoadLibraryA
GetProcAddress
lstrlenA
MapViewOfFile
UnmapViewOfFile
user32
MessageBoxA
GetFocus
wsprintfA
SetCursor
GetDlgItem
SendDlgItemMessageA
GetParent
PostMessageA
GetWindowRect
MoveWindow
LoadCursorA
RegisterClassA
CreateWindowExA
ShowWindow
UpdateWindow
DefWindowProcA
BeginPaint
GetSystemMetrics
EndPaint
PeekMessageA
TranslateMessage
DispatchMessageA
GetDC
ReleaseDC
SendMessageA
SetDlgItemTextA
gdi32
SetBkMode
SetTextColor
DeleteObject
CreateDIBitmap
SelectObject
CreateFontA
CreateSolidBrush
TextOutA
advapi32
RegCloseKey
RegQueryValueExA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
RegSetValueExA
RegOpenKeyExA
RegEnumKeyExA
RegQueryValueA
ole32
CoCreateInstance
CoInitialize
CoUninitialize
msvcr80
_unlock
__dllonexit
_lock
_onexit
_decode_pointer
_except_handler4_common
_invoke_watson
_controlfp_s
_strnicmp
_stricmp
_close
_read
_open
_strdup
_crt_debugger_hook
__set_app_type
_encode_pointer
strchr
memcpy
memset
strncat
strcat
strlen
strcpy
_localtime64
_time64
strtol
free
malloc
_putenv
_fstat64i32
fprintf
__iob_func
remove
fread
ftell
fseek
fopen
fclose
fflush
freopen
_snprintf
strncpy
strcmp
strrchr
_vsnprintf
sscanf
fwrite
strftime
sprintf
isspace
qsort
realloc
fgets
strncmp
__argv
__argc
_amsg_exit
__getmainargs
_cexit
_exit
_XcptFilter
_ismbblead
exit
_acmdln
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
_tempnam
Sections
.text Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
,KУuu Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE