Static task
static1
Behavioral task
behavioral1
Sample
Malicious_a126be241d8ba06b209caffbc3f803a137a8ac638d5063f8cafbea164491f505.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
Malicious_a126be241d8ba06b209caffbc3f803a137a8ac638d5063f8cafbea164491f505.exe
Resource
win10v2004-20230621-en
General
-
Target
Malicious_a126be241d8ba06b209caffbc3f803a137a8ac638d5063f8cafbea164491f505.exe
-
Size
95KB
-
MD5
0c701d644e3e1c859256ab6721ce590b
-
SHA1
9e372cdf4324c0c3c0ea87849fca1bf53e2cb77c
-
SHA256
a126be241d8ba06b209caffbc3f803a137a8ac638d5063f8cafbea164491f505
-
SHA512
2af687ecd5e6b2f9cfbcfc1dccd7879a9b323495c2243ca6e47d067e31b1f71da4173a3d3a0a4629e90acb59c3a171c9f06f20594ddded93c4ae23dffe1047bc
-
SSDEEP
1536:86JfCO3s6d1inu89TIfkZNw/VlqT+FhFKqzPlliSPTcqgoLSbgvVoZtn79/MVGhW:zfCkPi39ny/2T+FhFKsSpQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Malicious_a126be241d8ba06b209caffbc3f803a137a8ac638d5063f8cafbea164491f505.exe
Files
-
Malicious_a126be241d8ba06b209caffbc3f803a137a8ac638d5063f8cafbea164491f505.exe.exe windows x86
4b4c1e1cafb5e924f5c11455d2b07507
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegOpenKeyExW
RegCloseKey
RegSetValueExW
RegQueryValueExW
GetTraceLoggerHandle
GetTraceEnableLevel
GetTraceEnableFlags
RegisterTraceGuidsW
UnregisterTraceGuids
AllocateAndInitializeSid
CheckTokenMembership
FreeSid
RegDeleteValueW
EventRegister
EventWriteTransfer
RegEnumValueW
EventUnregister
RegLoadMUIStringW
RegDeleteTreeW
EventSetInformation
RegEnumKeyExW
RegCreateKeyExW
RegGetValueW
TraceMessage
OpenProcessToken
GetTokenInformation
ConvertSidToStringSidW
kernel32
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
HeapDestroy
HeapReAlloc
HeapSize
RaiseException
CloseHandle
GetCurrentThreadId
OpenMutexW
GetProductInfo
OpenEventW
CreateEventW
GetThreadUILanguage
VirtualQuery
GetSystemInfo
AcquireSRWLockExclusive
ReleaseSRWLockExclusive
LoadLibraryExA
VirtualProtect
MulDiv
VirtualFreeEx
ReadProcessMemory
VirtualAllocEx
GetThreadPreferredUILanguages
GetLocaleInfoEx
OOBEComplete
IsProcessInJob
OpenJobObjectW
FreeLibrary
CompareStringOrdinal
IsDebuggerPresent
CreateMutexExW
ProcessIdToSessionId
OpenSemaphoreW
WaitForSingleObjectEx
InitOnceComplete
OutputDebugStringW
FormatMessageW
ReleaseMutex
WaitForSingleObject
ReleaseSemaphore
CreateSemaphoreExW
InitOnceBeginInitialize
K32GetModuleBaseNameW
K32EnumProcessModules
K32EnumProcesses
FindResourceExW
LoadResource
LockResource
SizeofResource
MultiByteToWideChar
DeleteFileW
GetFileAttributesW
DeleteProcThreadAttributeList
CreateProcessW
SetThreadUILanguage
HeapSetInformation
Sleep
ExpandEnvironmentStringsW
GetCurrentProcessId
GetStartupInfoW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetModuleHandleW
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetTickCount
GetLastError
LocalFree
HeapAlloc
GetProcessHeap
HeapFree
GetModuleHandleExW
GetModuleFileNameA
DebugBreak
GetProcAddress
SetLastError
OpenProcess
InitializeProcThreadAttributeList
UpdateProcThreadAttribute
user32
LoadCursorW
SetCursor
KillTimer
GetAncestor
SendMessageW
SetDesktopColorTransform
SendNotifyMessageW
IsProcessDPIAware
GetShellWindow
SetTimer
GetSystemMetrics
PostMessageW
SystemParametersInfoW
SetWindowPos
FindWindowW
SendInput
UnregisterClassA
GetWindowThreadProcessId
GetKeyState
GetThreadDesktop
GetUserObjectInformationW
msvcrt
_cexit
_exit
_except_handler4_common
_lock
_unlock
malloc
memcpy_s
_wtoi
wcsrchr
wcsspn
wcscspn
memmove_s
_wcslwr_s
_wcmdln
calloc
_ltow_s
wcschr
wcsstr
_callnewh
??1type_info@@UAE@XZ
__dllonexit
_onexit
exit
__set_app_type
__CxxFrameHandler3
__setusermatherr
_initterm
_purecall
__wgetmainargs
_amsg_exit
__p__commode
_XcptFilter
free
_wcsicmp
_vsnwprintf
__p__fmode
_controlfp
?terminate@@YAXXZ
memset
ntdll
WinSqmIsOptedIn
WinSqmAddToStream
NtQueryWnfStateData
ole32
CoInitialize
CoUninitialize
CoCreateInstance
oleacc
AccessibleObjectFromWindow
GetProcessHandleFromHwnd
comctl32
ord344
api-ms-win-core-winrt-error-l1-1-0
SetRestrictedErrorInfo
api-ms-win-core-winrt-error-l1-1-1
RoGetMatchingRestrictedErrorInfo
shell32
ShellExecuteW
duser
InvalidateGadget
dui70
?GetOffText@TouchSwitch@DirectUI@@QAEPBGPAPAVValue@2@@Z
?GetOnText@TouchSwitch@DirectUI@@QAEPBGPAPAVValue@2@@Z
?GetContentString@Element@DirectUI@@QAEPBGPAPAVValue@2@@Z
?CustomProp@Element@DirectUI@@SGPBUPropertyInfo@2@XZ
?RemoveListener@Element@DirectUI@@QAEXPAUIElementListener@2@@Z
?GetValue@Element@DirectUI@@QAEPAVValue@2@P6GPBUPropertyInfo@2@XZHPAUUpdateCache@2@@Z
?Release@Value@DirectUI@@QAEXXZ
??0CritSecLock@DirectUI@@QAE@PAU_RTL_CRITICAL_SECTION@@@Z
??1CritSecLock@DirectUI@@QAE@XZ
?GetUnset@Value@DirectUI@@SGPAV12@XZ
?IsRTLReading@Element@DirectUI@@UAE_NXZ
?IsContentProtected@Element@DirectUI@@UAE_NXZ
?QueryInterface@Element@DirectUI@@UAGJABU_GUID@@PAPAX@Z
?UpdateTooltip@Element@DirectUI@@MAEXPAV12@@Z
?ActivateTooltip@Element@DirectUI@@MAEXPAV12@K@Z
?RemoveTooltip@Element@DirectUI@@MAEXPAV12@@Z
?GetChildren@Element@DirectUI@@QAEPAV?$DynamicArray@PAVElement@DirectUI@@$0A@@2@PAPAVValue@2@@Z
?GetKeyFocused@Element@DirectUI@@UAE_NXZ
?SetVisible@Element@DirectUI@@QAEJ_N@Z
?SetActive@Element@DirectUI@@QAEJH@Z
?SetAccessible@Element@DirectUI@@QAEJ_N@Z
UnInitThread
?Create@DUIXmlParser@DirectUI@@SGJPAPAV12@P6GPAVValue@2@PBGPAX@Z2P6GX11H2@Z2@Z
?Destroy@DUIXmlParser@DirectUI@@QAEXXZ
?SetXMLFromResource@DUIXmlParser@DirectUI@@QAEJIPAUHINSTANCE__@@0@Z
?CreateElement@DUIXmlParser@DirectUI@@QAEJPBGPAVElement@2@1PAKPAPAV32@@Z
??0ClassInfoBase@DirectUI@@QAE@XZ
??1ClassInfoBase@DirectUI@@UAE@XZ
?Initialize@ClassInfoBase@DirectUI@@QAEJPAUHINSTANCE__@@PBG_NPBQBUPropertyInfo@2@I@Z
?Register@ClassInfoBase@DirectUI@@QAEJXZ
?ClassExist@ClassInfoBase@DirectUI@@SG_NPAPAUIClassInfo@2@PBQBUPropertyInfo@2@IPAU32@PAUHINSTANCE__@@PBG_N@Z
?AddRef@ClassInfoBase@DirectUI@@UAEXXZ
?Release@ClassInfoBase@DirectUI@@UAEHXZ
?EnumPropertyInfo@ClassInfoBase@DirectUI@@UAEPBUPropertyInfo@2@I@Z
?GetByClassIndex@ClassInfoBase@DirectUI@@UAEPBUPropertyInfo@2@I@Z
?GetPICount@ClassInfoBase@DirectUI@@UBEIXZ
?GetGlobalIndex@ClassInfoBase@DirectUI@@UBEIXZ
?GetName@ClassInfoBase@DirectUI@@UBEPBGXZ
?IsValidProperty@ClassInfoBase@DirectUI@@UBE_NPBUPropertyInfo@2@@Z
?IsSubclassOf@ClassInfoBase@DirectUI@@UBE_NPAUIClassInfo@2@@Z
?GetModule@ClassInfoBase@DirectUI@@UBEPAUHINSTANCE__@@XZ
?IsGlobal@ClassInfoBase@DirectUI@@UBE_NXZ
?AddChild@ClassInfoBase@DirectUI@@UAEXXZ
?RemoveChild@ClassInfoBase@DirectUI@@UAEXXZ
?GetChildren@ClassInfoBase@DirectUI@@UBEHXZ
?AssertPIZeroRef@ClassInfoBase@DirectUI@@UBEXXZ
StartMessagePump
UnInitProcessPriv
?Destroy@Element@DirectUI@@QAEJ_N@Z
RegisterPVLBehaviorFactory
?SliderUpdated@TouchSlider@DirectUI@@SG?AVUID@@XZ
?GetClassInfoPtr@HWNDElement@DirectUI@@SGPAUIClassInfo@2@XZ
?ThemeChange@HWNDElement@DirectUI@@SG?AVUID@@XZ
InitProcessPriv
InitThread
?Click@TouchButton@DirectUI@@SG?AVUID@@XZ
StrToID
?GetToggleValue@TouchSwitch@DirectUI@@QAEHXZ
?SetToggleValue@TouchSwitch@DirectUI@@QAEXH@Z
?GetClassInfoPtr@TouchSwitch@DirectUI@@SGPAUIClassInfo@2@XZ
?GetUiaFocusDelegate@Element@DirectUI@@UAEPAV12@XZ
?HandleUiaEventListener@Element@DirectUI@@UAEXPAUEvent@2@@Z
?HandleUiaPropertyChangingListener@Element@DirectUI@@UAEXPBUPropertyInfo@2@@Z
?HandleUiaPropertyListener@Element@DirectUI@@UAEXPBUPropertyInfo@2@HPAVValue@2@1@Z
?HandleUiaDestroyListener@Element@DirectUI@@UAEXXZ
?GetElementProviderImpl@Element@DirectUI@@UAEJPAVInvokeHelper@2@PAPAVElementProvider@2@@Z
?GetUIAElementProvider@Element@DirectUI@@UAEJABU_GUID@@PAPAX@Z
?DefaultAction@Element@DirectUI@@UAEJXZ
?GetAccessibleImpl@Element@DirectUI@@UAEJPAPAUIAccessible@@@Z
?Register@Element@DirectUI@@SGJXZ
?GetClassInfoPtr@Element@DirectUI@@SGPAUIClassInfo@2@XZ
?GetFactoryLock@Element@DirectUI@@SGPAU_RTL_CRITICAL_SECTION@@XZ
?GetRoot@Element@DirectUI@@QAEPAV12@XZ
?OnUnHosted@Element@DirectUI@@MAEXPAV12@@Z
?OnHosted@Element@DirectUI@@MAEXPAV12@@Z
?_SelfLayoutUpdateDesiredSize@Element@DirectUI@@MAE?AUtagSIZE@@HHPAVSurface@2@@Z
?_SelfLayoutDoLayout@Element@DirectUI@@MAEXHH@Z
?GetImmersiveFocusRectOffsets@Element@DirectUI@@UAEXPAUtagRECT@@@Z
?MessageCallback@Element@DirectUI@@UAEIPAUtagGMSG@@@Z
?RemoveBehavior@Element@DirectUI@@UAEJPAUIDuiBehavior@@@Z
?AddBehavior@Element@DirectUI@@UAEJPAUIDuiBehavior@@@Z
?AddListener@Element@DirectUI@@QAEJPAUIElementListener@2@@Z
?SetKeyFocus@Element@DirectUI@@UAEXXZ
?EnsureVisible@Element@DirectUI@@UAE_NHHHH@Z
?GetAdjacent@Element@DirectUI@@UAEPAV12@PAV12@HPBUNavReference@2@K@Z
?IsDescendent@Element@DirectUI@@QAE_NPAV12@@Z
?FindDescendent@Element@DirectUI@@QAEPAV12@G@Z
?Remove@Element@DirectUI@@UAEJPAPAV12@I@Z
?Insert@Element@DirectUI@@UAEJPAPAV12@II@Z
?Add@Element@DirectUI@@UAEJPAPAV12@I@Z
?GetContentSize@Element@DirectUI@@UAE?AUtagSIZE@@HHPAVSurface@2@@Z
?OnEvent@Element@DirectUI@@UAEXPAUEvent@2@@Z
?OnDestroy@Element@DirectUI@@UAEXXZ
?OnMouseFocusMoved@Element@DirectUI@@UAEXPAV12@0@Z
?OnKeyFocusMoved@Element@DirectUI@@UAEXPAV12@0@Z
?OnInput@Element@DirectUI@@UAEXPAUInputEvent@2@@Z
?OnGroupChanged@Element@DirectUI@@UAEXH_N@Z
?OnPropertyChanged@Element@DirectUI@@UAEXPAUPropertyInfo@2@HPAVValue@2@1@Z
?OnPropertyChanged@Element@DirectUI@@UAEXPBUPropertyInfo@2@HPAVValue@2@1@Z
?OnPropertyChanging@Element@DirectUI@@UAE_NPAUPropertyInfo@2@HPAVValue@2@1@Z
?OnPropertyChanging@Element@DirectUI@@UAE_NPBUPropertyInfo@2@HPAVValue@2@1@Z
?GetContentStringAsDisplayed@Element@DirectUI@@UAEPBGPAPAVValue@2@@Z
?Initialize@Element@DirectUI@@QAEJIPAV12@PAK@Z
??1Element@DirectUI@@UAE@XZ
??0Element@DirectUI@@QAE@XZ
shcore
ord244
Sections
.text Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.imrsiv Size: - Virtual size: 4B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.didat Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ