Static task
static1
Behavioral task
behavioral1
Sample
nec_test.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
nec_test.exe
Resource
win10v2004-20230220-en
General
-
Target
nec_test.exe
-
Size
343KB
-
MD5
1b9df2cc461457c271dc76f4bc9fa760
-
SHA1
0398508147c3ceae824ba33d1eceea40e7a76eda
-
SHA256
cde1b8042fe9bb04bae9e4a103243ba0641c99d8952247b0a68f462744f3bc40
-
SHA512
b9d1e98a488837691c0282603a1fbfb566dcd225a1674b7d47310faed328038bd97b1054cc2911b24075e7cb7f4d33e85f6d258d65c4c6dd2616706a7bef9454
-
SSDEEP
3072:PXmhjL8lWSjbi2woTSKma32S9I3ysljv5BAHi9BD1gd4Twr90lGX8BRterfmWP9O:vmhjQ9ka32S9IC4jBDy4TZsitufmWPC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource nec_test.exe
Files
-
nec_test.exe.exe windows x86
abf6be729d27b840e35eb6bef5005876
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegOpenKeyA
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
RegCreateKeyExA
RegSetValueExA
RegDeleteKeyA
RegDeleteValueA
RegSetValueA
RegCreateKeyA
RegQueryValueA
GetFileSecurityA
SetFileSecurityA
comctl32
ord17
ord13
ord14
ImageList_Destroy
gdi32
CreateFontA
GetCurrentPositionEx
BitBlt
CreatePalette
RealizePalette
GetStockObject
TextOutA
GetDeviceCaps
Rectangle
Ellipse
GetNearestPaletteIndex
SetDIBitsToDevice
CreateSolidBrush
CreateBitmap
GetObjectA
CreateCompatibleDC
SetBkColor
SetTextColor
DeleteDC
SaveDC
RestoreDC
SelectObject
SelectPalette
SetBkMode
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetClipBox
SelectClipRgn
ExcludeClipRect
IntersectClipRect
MoveToEx
LineTo
SetTextAlign
CreateRectRgn
DeleteObject
GetWindowExtEx
GetViewportExtEx
CreatePen
CreatePatternBrush
PtVisible
RectVisible
ExtTextOutA
Escape
CreateFontIndirectA
GetTextMetricsA
GetTextExtentPointA
GetBkColor
GetTextColor
CreateRectRgnIndirect
PatBlt
LPtoDP
DPtoLP
GetMapMode
CombineRgn
SetRectRgn
CopyMetaFileA
kernel32
GetProfileStringA
GetTickCount
GlobalFree
GlobalAlloc
WriteProfileStringA
GetCurrentThread
GetCurrentThreadId
lstrcmpA
GlobalDeleteAtom
GlobalLock
FindResourceA
LoadResource
LockResource
GlobalUnlock
CloseHandle
InterlockedDecrement
InterlockedIncrement
lstrlenA
WideCharToMultiByte
MultiByteToWideChar
lstrcatA
MulDiv
GetCurrentProcess
DuplicateHandle
GetLastError
CreateFileA
ReadFile
WriteFile
SetFilePointer
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
MoveFileA
DeleteFileA
FreeLibrary
LoadLibraryA
GetProcAddress
GetFullPathNameA
lstrcpynA
GetVolumeInformationA
FindFirstFileA
FindClose
lstrcpyA
lstrcmpiA
GetThreadLocale
GetStringTypeExA
GetModuleFileNameA
GetShortPathNameA
GetCommandLineA
GetStartupInfoA
GetModuleHandleA
GlobalFlags
GetCurrentDirectoryA
GetDiskFreeSpaceA
LocalAlloc
LocalFree
TlsAlloc
InitializeCriticalSection
TlsFree
GlobalHandle
DeleteCriticalSection
EnterCriticalSection
GlobalReAlloc
LeaveCriticalSection
TlsGetValue
LocalReAlloc
TlsSetValue
GetPrivateProfileStringA
WritePrivateProfileStringA
GetVersion
GetProcessVersion
GetStdHandle
GetFileType
ExitProcess
SetErrorMode
GetFileTime
GetFileSize
SystemTimeToFileTime
LocalFileTimeToFileTime
GetFileAttributesA
SetFileTime
GetEnvironmentStrings
FormatMessageA
GetTempFileNameA
FileTimeToLocalFileTime
FileTimeToSystemTime
GlobalGetAtomNameA
GlobalAddAtomA
GlobalSize
oleaut32
SysAllocString
VariantClear
SysFreeString
VariantChangeType
VariantCopy
SysAllocStringLen
SysAllocStringByteLen
SysStringLen
LoadTypeLi
shell32
SHGetFileInfoA
ExtractIconA
DragQueryFileA
DragFinish
user32
OemToCharA
CharToOemA
UpdateWindow
GetClientRect
GetSystemMetrics
SetWindowPos
SendMessageA
PostQuitMessage
BringWindowToTop
ShowCursor
EnableWindow
FillRect
InvertRect
FrameRect
DrawTextA
LoadCursorA
GetWindowDC
ReleaseDC
KillTimer
InvalidateRect
SetTimer
IsWindowVisible
GetKeyboardState
InflateRect
OffsetRect
PeekMessageA
PostMessageA
GetWindowLongA
GetDlgItem
IsWindowEnabled
GetParent
CreateDialogIndirectParamA
DestroyWindow
IsWindow
GetActiveWindow
SetActiveWindow
EndDialog
GetNextDlgTabItem
SetWindowsHookExA
CheckDlgButton
CheckRadioButton
SendDlgItemMessageA
SetDlgItemTextA
IsDlgButtonChecked
IsDialogMessageA
SetWindowTextA
GetWindowTextA
GetWindowTextLengthA
GetDlgCtrlID
SetWindowLongA
MoveWindow
ShowWindow
SetFocus
EnableMenuItem
GetFocus
CheckMenuItem
SetMenuItemBitmaps
GetMenuState
ModifyMenuA
GetMenuCheckMarkDimensions
LoadBitmapA
GetCursorPos
ValidateRect
CallNextHookEx
GetKeyState
GetMessageA
TranslateMessage
DispatchMessageA
ShowOwnedPopups
SetCursor
MessageBoxA
UnhookWindowsHookEx
CharUpperA
LoadStringA
CopyRect
GetWindowRect
GetWindow
GetLastActivePopup
GetForegroundWindow
SetForegroundWindow
GetMessageTime
GetMessagePos
GetPropA
CallWindowProcA
RemovePropA
SetPropA
CreateWindowExA
DefWindowProcA
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetMenu
GetClassInfoA
RegisterClassA
wsprintfA
GetCapture
WinHelpA
IsChild
GetTopWindow
SetScrollPos
GetScrollPos
ScreenToClient
BeginDeferWindowPos
EndDeferWindowPos
EqualRect
DeferWindowPos
AdjustWindowRectEx
GetSysColor
SystemParametersInfoA
MapWindowPoints
LoadIconA
RegisterWindowMessageA
GetDC
BeginPaint
EndPaint
TabbedTextOutA
GrayStringA
GetClassNameA
ClientToScreen
PtInRect
GetDesktopWindow
GetMenuStringA
DeleteMenu
InsertMenuA
DestroyIcon
IsIconic
GetSysColorBrush
WindowFromPoint
DestroyMenu
CharNextA
LoadMenuA
LoadAcceleratorsA
SetRect
SetRectEmpty
TranslateAcceleratorA
ReleaseCapture
SetMenu
UnpackDDElParam
ReuseDDElParam
IntersectRect
AppendMenuA
RegisterClipboardFormatA
UnregisterClassA
PostThreadMessageA
LockWindowUpdate
GetDCEx
SetCapture
RedrawWindow
SetCursorPos
DestroyCursor
SetParent
IsRectEmpty
GetSystemMenu
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
comdlg32
GetFileTitleA
GetOpenFileNameA
GetSaveFileNameA
ole32
CoDisconnectObject
CoTaskMemFree
CoTaskMemAlloc
OleDuplicateData
StringFromCLSID
ReleaseStgMedium
CoRegisterMessageFilter
CoRegisterClassObject
CoRevokeClassObject
CreateStreamOnHGlobal
oledlg
ord8
Sections
.text Size: 222KB - Virtual size: 221KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 10KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.exc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 304B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 57KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 132B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ