Static task
static1
Behavioral task
behavioral1
Sample
81dbb6e102bab3b5a12379519166a5bfed285054ad762e43eef51ecc87f65108.exe
Resource
win7-20240903-en
General
-
Target
81dbb6e102bab3b5a12379519166a5bfed285054ad762e43eef51ecc87f65108
-
Size
551KB
-
MD5
74871abdf70d247e830105d422cff236
-
SHA1
2d0f353e1600ce2290f6a66f7227ceed82063227
-
SHA256
81dbb6e102bab3b5a12379519166a5bfed285054ad762e43eef51ecc87f65108
-
SHA512
23ff975cbc1afc8959008259ed5e8734bef6121a0577c13c0ebb2cdbed2e848e32c1ffcf3aa1878a95096495892c215b508724399c627ca52b47fc021a00ddb6
-
SSDEEP
3072:gY3rkgWq7Y+jbkGenScL1FsrKY/gnl4PNN0Bi3434YFOmOXoHOZNxjRIpnWMHmIY:FYqel7oe4nmOXouZq4XJa5Ga
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 81dbb6e102bab3b5a12379519166a5bfed285054ad762e43eef51ecc87f65108
Files
-
81dbb6e102bab3b5a12379519166a5bfed285054ad762e43eef51ecc87f65108.exe windows:4 windows x86 arch:x86
f0bbb53ead24b78ae0d5f12f05b3d67f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualAllocEx
GetModuleHandleA
GetLastError
FindVolumeMountPointClose
CreateFileA
GetVersion
OpenWaitableTimerW
GetProfileIntA
SetThreadPriority
GetStdHandle
TerminateJobObject
EnumResourceLanguagesW
GetCurrentDirectoryA
FindNextVolumeMountPointW
GetPrivateProfileIntA
GetSystemTimeAdjustment
EnumResourceLanguagesA
TransmitCommChar
user32
AnyPopup
CharNextW
CharNextA
GetClipboardFormatNameA
ShowCaret
GetMouseMovePointsEx
MessageBoxExA
OemToCharBuffA
CharNextExA
DdeFreeDataHandle
ChangeDisplaySettingsExA
SetMenuInfo
IsCharAlphaNumericA
CreateDialogIndirectParamW
DefDlgProcA
GetOpenClipboardWindow
ActivateKeyboardLayout
DialogBoxParamA
WaitForInputIdle
GetClassInfoExW
WinHelpW
EnumDesktopsA
SetWindowLongA
SendNotifyMessageA
SetRect
DdeSetQualityOfService
GetClipboardOwner
LoadIconW
SetActiveWindow
PtInRect
GetClipCursor
gdi32
GetStockObject
RealizePalette
advapi32
RegOpenKeyW
SetFileSecurityW
GetSecurityDescriptorControl
LookupPrivilegeValueA
OpenProcessToken
AdjustTokenPrivileges
InitializeSecurityDescriptor
SetSecurityDescriptorOwner
SetSecurityDescriptorDacl
SetSecurityDescriptorControl
IsValidSecurityDescriptor
GetLengthSid
InitializeAcl
AddAccessAllowedAce
GetUserNameA
LookupAccountNameA
GetFileSecurityW
shell32
SHFileOperationW
Sections
.text Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 293B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.t4xt12 Size: 107KB - Virtual size: 107KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.t4xt11 Size: 359KB - Virtual size: 359KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 74KB - Virtual size: 74KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ