Static task
static1
Behavioral task
behavioral1
Sample
494dee6cacea476a97ef16c3ac14f24bf703ea2c0ef05ad57fc4d8110d1fd25f.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
494dee6cacea476a97ef16c3ac14f24bf703ea2c0ef05ad57fc4d8110d1fd25f.exe
Resource
win10v2004-20230220-en
General
-
Target
494dee6cacea476a97ef16c3ac14f24bf703ea2c0ef05ad57fc4d8110d1fd25f
-
Size
1.8MB
-
MD5
336e3591a1b71fe9cd2e82ad24b3aeb5
-
SHA1
cffb06a43ae837204a307b13e635a181e9ab3195
-
SHA256
494dee6cacea476a97ef16c3ac14f24bf703ea2c0ef05ad57fc4d8110d1fd25f
-
SHA512
327e78d71fd2e16c6758f04a7492364ee3ccc3895a2e27498a73582965c2e538494d0fd5d66c2c372ac46e7fc27d58db3d6219b8168de56cfe606cf9032f20ce
-
SSDEEP
49152:ZmPlF93Bov8gEUbGJvXknN2rpyFb4sCrtx:ZIFFrkGJ2N2rkF8T
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 494dee6cacea476a97ef16c3ac14f24bf703ea2c0ef05ad57fc4d8110d1fd25f
Files
-
494dee6cacea476a97ef16c3ac14f24bf703ea2c0ef05ad57fc4d8110d1fd25f.exe windows x86
ec62833f16b890c3b2ef033d5b25807e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SizeofResource
GetCPInfo
GetOEMCP
GetFileAttributesA
GetFileSize
GetFileTime
SetErrorMode
RtlUnwind
ExitProcess
TerminateProcess
GetCommandLineA
HeapFree
HeapAlloc
RaiseException
GetTimeZoneInformation
HeapReAlloc
HeapSize
GetACP
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetProcessVersion
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
LCMapStringA
LCMapStringW
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
SetStdHandle
CompareStringA
CompareStringW
SetEnvironmentVariableA
WritePrivateProfileStringA
GetProfileStringA
GlobalFlags
TlsGetValue
LocalReAlloc
TlsSetValue
EnterCriticalSection
GlobalReAlloc
LeaveCriticalSection
TlsFree
GlobalHandle
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
LocalAlloc
GetFullPathNameA
lstrcpynA
GetVolumeInformationA
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
CreateFileA
GetCurrentProcess
DuplicateHandle
MulDiv
SetLastError
FormatMessageA
LocalFree
FileTimeToLocalFileTime
FileTimeToSystemTime
LoadLibraryA
FreeLibrary
GetVersion
lstrcatA
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
lstrcpyA
GetModuleHandleA
GetProcAddress
MultiByteToWideChar
WideCharToMultiByte
lstrlenA
InterlockedDecrement
InterlockedIncrement
GlobalUnlock
GlobalFree
LockResource
FindResourceA
LoadResource
GlobalLock
GlobalAlloc
GlobalDeleteAtom
lstrcmpA
lstrcmpiA
GetCurrentThread
GetCurrentThreadId
CreatePipe
GetStartupInfoA
CreateProcessA
GetLastError
CreateThread
CreateEventA
SetEvent
ReadFile
WaitForSingleObject
GetExitCodeProcess
CloseHandle
FindFirstFileA
FindClose
GetTempPathA
GetLongPathNameA
Sleep
DeleteFileA
GetModuleFileNameA
GetEnvironmentStrings
user32
GetClassNameA
PtInRect
GetSysColorBrush
InvalidateRect
GetTopWindow
GetCapture
WinHelpA
wsprintfA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetWindowTextLengthA
GetWindowTextA
GetDlgCtrlID
DefWindowProcA
CreateWindowExA
GetClassLongA
SetPropA
UnhookWindowsHookEx
GetPropA
CallWindowProcA
RemovePropA
GetMessageTime
GetMessagePos
LoadCursorA
SetForegroundWindow
GetWindow
SetWindowLongA
BeginPaint
RegisterWindowMessageA
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
EndDialog
SetActiveWindow
IsWindow
CreateDialogIndirectParamA
DestroyWindow
GetDlgItem
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
GetKeyState
CallNextHookEx
ValidateRect
IsWindowVisible
PeekMessageA
GetCursorPos
SetWindowsHookExA
GetParent
LoadIconA
SendMessageA
AppendMenuA
GetSystemMenu
UnregisterClassA
HideCaret
ShowCaret
ExcludeUpdateRgn
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
MessageBoxA
SetCursor
PostQuitMessage
PostMessageA
EnableWindow
IsIconic
CharUpperA
GrayStringA
DrawTextA
TabbedTextOutA
GetForegroundWindow
EndPaint
GetSystemMetrics
GetClientRect
DrawFocusRect
DefDlgProcA
InflateRect
CharNextA
IsWindowUnicode
DrawIcon
GetWindowDC
ReleaseDC
GetDC
ClientToScreen
DestroyMenu
LoadStringA
ShowWindow
SetWindowTextA
IsDialogMessageA
SetDlgItemTextA
UpdateWindow
SendDlgItemMessageA
MapWindowPoints
GetSysColor
SetFocus
AdjustWindowRectEx
ScreenToClient
CopyRect
SetWindowPos
gdi32
SetBkMode
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
IntersectClipRect
GetStockObject
DeleteObject
GetDeviceCaps
CreateSolidBrush
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SelectObject
RestoreDC
SaveDC
DeleteDC
GetObjectA
SetBkColor
SetTextColor
GetClipBox
CreateDIBitmap
PatBlt
GetTextExtentPointA
BitBlt
CreateCompatibleDC
CreateBitmap
comdlg32
GetFileTitleA
GetOpenFileNameA
GetSaveFileNameA
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
advapi32
RegSetValueExA
RegOpenKeyExA
RegCreateKeyExA
RegCloseKey
shell32
ShellExecuteA
comctl32
ord17
oleaut32
VariantChangeType
SysAllocString
VariantCopy
VariantTimeToSystemTime
VariantClear
ws2_32
WSAStartup
WSACleanup
gethostbyname
socket
ntohl
recvfrom
closesocket
sendto
setsockopt
htonl
htons
Sections
.text Size: 104KB - Virtual size: 102KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ