Static task
static1
Behavioral task
behavioral1
Sample
55f121a4de7753de30b2f51fa9400e2f3ca665a04420cb438ca02008258f0eef.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
55f121a4de7753de30b2f51fa9400e2f3ca665a04420cb438ca02008258f0eef.exe
Resource
win10v2004-20230220-en
General
-
Target
55f121a4de7753de30b2f51fa9400e2f3ca665a04420cb438ca02008258f0eef
-
Size
3.2MB
-
MD5
c5563f6f79255891f9355d5e3847d6a7
-
SHA1
f32afad5f7ac9bc1d34b0207ffa2200acc852fb9
-
SHA256
55f121a4de7753de30b2f51fa9400e2f3ca665a04420cb438ca02008258f0eef
-
SHA512
41c8e5dc0d5640407209f9dfb8da2b582f19e199f61eb28f584b61ba73fd835913c0b1133784ec5280d1378ee1c1d4ea85ea5912a7ca6f3b333d034d2b3a26c6
-
SSDEEP
49152:VUmiO/XyMYx+TahNJI1UT7o9e9sGvjAnEd2Sqt:3iO/2xaalIfhj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 55f121a4de7753de30b2f51fa9400e2f3ca665a04420cb438ca02008258f0eef
Files
-
55f121a4de7753de30b2f51fa9400e2f3ca665a04420cb438ca02008258f0eef.exe windows x86
7b6d14b6b934989cbf04fac246fc310d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcpyA
GetLocalTime
SetFileTime
SystemTimeToFileTime
FileTimeToSystemTime
GetFileTime
GetSystemTime
FindClose
FindFirstFileA
GetWindowsDirectoryA
DeleteFileA
GetLastError
WriteConsoleA
SetConsoleTextAttribute
GetConsoleScreenBufferInfo
GetStdHandle
GetProcessTimes
GetCurrentProcess
SetEnvironmentVariableA
GetOEMCP
GetACP
CompareStringW
CompareStringA
GetCPInfo
SetStdHandle
RtlUnwind
GetEnvironmentStringsW
lstrlenA
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
RaiseException
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
WideCharToMultiByte
FlushFileBuffers
GetFileType
SetHandleCount
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetVersion
GetCommandLineA
GetStartupInfoA
GetModuleHandleA
GetTimeZoneInformation
HeapReAlloc
TerminateProcess
ExitProcess
HeapFree
HeapAlloc
SetFilePointer
GetModuleFileNameA
CreateThread
Sleep
GetFileSize
ReadFile
MultiByteToWideChar
GlobalAlloc
GlobalFree
LoadLibraryA
GetProcAddress
GetTempPathA
lstrcatA
FindResourceA
LoadResource
SetEndOfFile
SizeofResource
LockResource
CreateFileA
WriteFile
CloseHandle
GetEnvironmentStrings
FreeResource
user32
RegisterClassA
ShowWindow
UpdateWindow
GetMessageA
TranslateAcceleratorA
LoadIconA
DispatchMessageA
GetWindowRect
DefWindowProcA
MessageBoxA
GetWindowLongA
GetClientRect
TranslateMessage
DialogBoxParamA
SetWindowLongA
wsprintfA
DestroyWindow
SendMessageA
CreateWindowExA
PostQuitMessage
KillTimer
ScreenToClient
EndPaint
BeginPaint
GetSystemMetrics
InvalidateRect
SetRect
CheckMenuItem
TrackPopupMenu
GetSubMenu
EnableMenuItem
LoadMenuA
DestroyMenu
GetCursorPos
LoadBitmapA
SetDlgItemTextA
SetWindowTextA
SetWindowPos
GetWindowTextLengthA
EndDialog
SetFocus
GetDlgItem
MoveWindow
CheckDlgButton
GetDC
ReleaseDC
SetTimer
IsDlgButtonChecked
SetCapture
LoadCursorA
ShowCursor
ClipCursor
ReleaseCapture
SetCursor
FillRect
GetDlgItemTextA
gdi32
StretchBlt
DeleteDC
GetObjectA
SetStretchBltMode
SelectObject
CreateCompatibleDC
FillRgn
CreatePolygonRgn
TextOutA
SetBkColor
SetTextColor
SetBkMode
LineTo
MoveToEx
CreatePen
GetStockObject
Ellipse
CreateFontIndirectA
CreateSolidBrush
GetTextExtentPoint32A
DeleteObject
comdlg32
GetOpenFileNameA
GetSaveFileNameA
shell32
ShellExecuteA
ole32
OleSetContainedObject
OleCreate
OleUninitialize
OleInitialize
oleaut32
SysAllocString
VariantClear
SafeArrayCreate
SafeArrayAccessData
SafeArrayDestroy
VariantInit
ws2_32
select
__WSAFDIsSet
socket
gethostbyname
closesocket
WSACleanup
htons
connect
send
recv
WSAStartup
Sections
.text Size: 864KB - Virtual size: 862KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 244KB - Virtual size: 241KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1.8MB - Virtual size: 4.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 120KB - Virtual size: 119KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rmnet Size: 172KB - Virtual size: 172KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE