Static task
static1
Behavioral task
behavioral1
Sample
a66271b14f6e0f838757cbc034f5d816781ff04e635c69acd6583ce5018d0748.exe
Resource
win7-20241023-en
General
-
Target
a66271b14f6e0f838757cbc034f5d816781ff04e635c69acd6583ce5018d0748.exe
-
Size
192KB
-
MD5
4ab52ea99d285af0909586640c611cdf
-
SHA1
95853068db9fcb41dec1d3ae4f50968a2300cd22
-
SHA256
a66271b14f6e0f838757cbc034f5d816781ff04e635c69acd6583ce5018d0748
-
SHA512
b140508650d6b9b7ab1ddbc840e66f18fbf0e63c21ad504e7001102a334667b38b47a640bee8a58034bbe1c507bd472602d767de217cb495f53831d05bb3ee96
-
SSDEEP
6144:vBPd5fiNjmCI/y+5HJR8PIIcKK9Kpl1qNeH7tZep:pPnaVmvx5HwPIFLI4NsZep
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a66271b14f6e0f838757cbc034f5d816781ff04e635c69acd6583ce5018d0748.exe
Files
-
a66271b14f6e0f838757cbc034f5d816781ff04e635c69acd6583ce5018d0748.exe.exe windows:4 windows x86 arch:x86
7419b525a1a8301742917ca7c4668fd7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapSize
VirtualQuery
RtlUnwind
GetCPInfo
IsBadWritePtr
HeapReAlloc
VirtualAlloc
HeapAlloc
SetStdHandle
VirtualFree
HeapCreate
HeapDestroy
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
QueryPerformanceCounter
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetModuleFileNameA
GetStdHandle
WriteFile
CloseHandle
HeapFree
SetFilePointer
GetLastError
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeW
GetLocaleInfoA
LoadLibraryA
GetProcAddress
VirtualAllocEx
GetSystemInfo
FindClose
lstrcpynW
GlobalSize
GetExitCodeProcess
GetTempPathW
TerminateProcess
ExitProcess
GetVersionExA
GetCommandLineA
GetStartupInfoA
GetModuleHandleA
GetConsoleOutputCP
FlushFileBuffers
InterlockedExchange
WideCharToMultiByte
LocalLock
GetFullPathNameW
LoadLibraryW
FormatMessageW
GetModuleFileNameW
DeleteCriticalSection
GetCurrentProcess
FileTimeToLocalFileTime
InterlockedCompareExchange
GetStringTypeA
GetOEMCP
Sleep
WaitForMultipleObjects
GetACP
GetEnvironmentStrings
VirtualProtect
user32
GetDC
DrawIcon
MoveWindow
ClientToScreen
SetWindowsHookExW
GetMenuState
UpdateWindow
ShowScrollBar
CreateCursor
CreateAcceleratorTableW
MonitorFromWindow
GetDlgItemTextW
GetMessageA
CharUpperW
IsWindowUnicode
ToAscii
EnableMenuItem
GetActiveWindow
RealChildWindowFromPoint
GetMenu
SendDlgItemMessageW
GetSystemMetrics
GetSubMenu
SetDlgItemInt
ShowWindow
InflateRect
WindowFromPoint
GetMenuStringW
GetMenuItemID
DestroyMenu
LoadIconW
DrawTextW
CreateCaret
SetWindowLongW
IsChild
gdi32
GetDeviceCaps
GetObjectW
SetTextAlign
EnumFontFamiliesExW
SetROP2
RestoreDC
Rectangle
SaveDC
ExtTextOutW
GetTextExtentPoint32W
CreateCompatibleDC
DPtoLP
DeleteDC
DeleteObject
AddFontResourceW
PatBlt
CreateHatchBrush
BitBlt
comdlg32
ChooseColorW
ChooseFontW
PageSetupDlgA
GetOpenFileNameA
ReplaceTextA
ChooseFontA
ReplaceTextW
PrintDlgW
FindTextA
GetSaveFileNameW
GetSaveFileNameA
ChooseColorA
GetOpenFileNameW
PrintDlgA
FindTextW
GetFileTitleA
PageSetupDlgW
advapi32
RegOpenKeyExA
RegCreateKeyW
RegSetValueExW
RegEnumKeyExA
RegCreateKeyExW
RegCloseKey
RegQueryValueExW
RegQueryInfoKeyA
RegDeleteValueW
RegQueryInfoKeyW
RegDeleteKeyW
RegSetValueExA
RegEnumKeyExW
RegCreateKeyA
RegOpenKeyExW
RegCreateKeyExA
RegDeleteValueA
RegDeleteKeyA
Sections
.text Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 123KB - Virtual size: 375KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE