Static task
static1
Behavioral task
behavioral1
Sample
334af8742cc155exeexeexeex.exe
Resource
win7-20230703-en
General
-
Target
334af8742cc155exeexeexeex.exe
-
Size
1.6MB
-
MD5
334af8742cc155f55f3ad5502a0b6727
-
SHA1
c15bbdc2dc7bf823f014dfffd6e40d6d816bfe56
-
SHA256
f1888d3960098aa15d7314428990dbd94a0d0f9d949df08b79c327908460b56e
-
SHA512
d4a3c4fdb7794b9e68cf80f2aee4fd22a0acde97e4b457de259bd39e97d7beaf7690a7f0313f4b843a1fd0cbb0fa2370c706baf6a470679d2f336f0370dbaf57
-
SSDEEP
24576:d5N5tlPS80n5YPGl1QhpzGfVanEyHkbMD1Nkr67pfz/KXqv1:htPS80nm41QjzGfVHyHkUX865DKU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 334af8742cc155exeexeexeex.exe
Files
-
334af8742cc155exeexeexeex.exe.exe windows x86
588fae21ae8cc40c3dd1a1c7f5c3ed19
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdiplus
GdipGetPathWorldBoundsI
GdipSetClipRegion
GdipSetClipRectI
GdipDrawImageRectRectI
GdipDrawImageRectI
GdipFillRectangleI
GdipGraphicsClear
GdipDrawPath
GdipRotateWorldTransform
GdipTranslateWorldTransform
GdipDeleteGraphics
GdipGetImageGraphicsContext
GdipTranslateRegionI
GdipGetPointCount
GdipTransformPath
GdipAddPathPath
GdipAddPathPolygon
GdipAddPathRectangleI
GdipResetPath
GdipDeletePath
GdipCreatePath
GdipSetPenDashArray
GdipDeletePen
GdipCreatePen1
GdipCreateRegionRectI
GdipCreateSolidFill
GdipCloneBrush
GdipDeleteBrush
GdipRotateMatrix
GdipScaleMatrix
GdipTranslateMatrix
GdipDeleteMatrix
GdipCreateMatrix
GdipSetImageAttributesThreshold
GdipSetImageAttributesColorMatrix
GdipGetImageVerticalResolution
GdipGetImagePaletteSize
GdipGetImagePalette
GdipSetImagePalette
GdipDisposeImageAttributes
GdipCreateImageAttributes
GdipGetImageHorizontalResolution
GdipImageRotateFlip
GdipCreateBitmapFromStream
GdipCreateBitmapFromScan0
GdipCreateBitmapFromGdiDib
GdipBitmapLockBits
GdipBitmapUnlockBits
GdipCreateRegionPath
GdipDeleteRegion
GdipCreateHatchBrush
GdipCombineRegionRectI
GdipBitmapSetResolution
GdipGetImageHeight
GdipGetImageWidth
GdipSaveAddImage
GdipSaveAdd
GdipSaveImageToStream
GdipSaveImageToFile
GdipCloneImage
GdipDisposeImage
GdipAlloc
GdipCreateFromHDC
GdiplusShutdown
GdiplusStartup
GdipGetImageEncoders
GdipGetImageEncodersSize
GdipCloneBitmapAreaI
GdipGetImagePixelFormat
GdipFree
shlwapi
PathRemoveFileSpecW
PathFindExtensionW
PathIsFileSpecW
SHCreateStreamOnFileEx
PathFindFileNameW
psapi
EnumProcesses
EnumProcessModules
GetModuleFileNameExW
GetModuleBaseNameW
kernel32
GetPrivateProfileStringW
RemoveDirectoryW
GetFullPathNameW
SetFileAttributesW
MoveFileExW
GetSystemDirectoryW
DeviceIoControl
GetFileTime
SizeofResource
LockResource
LoadResource
FindResourceExW
GetPrivateProfileStringA
GlobalFree
GlobalUnlock
GlobalLock
ProcessIdToSessionId
GlobalAlloc
LocalAlloc
SetCurrentDirectoryW
GetCurrentDirectoryW
GetComputerNameExW
FindFirstFileW
GetSystemDefaultLCID
FlushViewOfFile
OpenFileMappingW
GlobalMemoryStatusEx
CreatePipe
WaitForMultipleObjects
TryEnterCriticalSection
GetEnvironmentVariableW
PeekNamedPipe
GetFileSizeEx
GetShortPathNameW
CreateDirectoryW
OpenMutexW
GetFileAttributesW
GetSystemTime
GetLocalTime
ResetEvent
TerminateThread
GetExitCodeProcess
GetExitCodeThread
CreateThread
CreateProcessW
GetVersionExW
WritePrivateProfileStringA
ExitThread
FindResourceW
SetEnvironmentVariableA
CompareStringW
SetEndOfFile
WriteConsoleW
SetStdHandle
GetLastError
GetModuleFileNameW
ExpandEnvironmentStringsW
InitializeCriticalSection
GetCurrentProcessId
MultiByteToWideChar
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
GetTickCount
CreateFileW
Sleep
SetFilePointer
WriteFile
CloseHandle
OutputDebugStringW
GetCurrentThreadId
QueryPerformanceCounter
OpenProcess
GetFileAttributesExW
GetCommandLineW
GetTempFileNameW
GetLongPathNameW
SearchPathW
FormatMessageW
LocalFree
CreateMutexW
WaitForSingleObject
CreateFileMappingW
MapViewOfFile
ReleaseMutex
UnmapViewOfFile
SetLastError
LoadLibraryW
GetProcAddress
FreeLibrary
QueryPerformanceFrequency
DeleteFileW
SetEvent
GetUserDefaultUILanguage
SetThreadUILanguage
CreateEventW
OpenEventW
GetLocaleInfoW
SetThreadExecutionState
GetDiskFreeSpaceExW
GetSystemDefaultLangID
GetUserDefaultLangID
GetSystemDefaultUILanguage
GetWindowsDirectoryW
CopyFileW
WritePrivateProfileStringW
MoveFileW
GetTempPathW
HeapFree
GetProcessHeap
MulDiv
HeapAlloc
FindFirstFileExW
FindNextFileW
FindClose
WideCharToMultiByte
lstrlenW
InterlockedIncrement
InterlockedDecrement
InterlockedCompareExchange
InterlockedExchange
GetStringTypeW
EncodePointer
DecodePointer
HeapSetInformation
GetStartupInfoW
GetSystemTimeAsFileTime
GetTimeFormatW
GetDateFormatW
RaiseException
RtlUnwind
LCMapStringW
GetCPInfo
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
HeapSize
ReadFile
ExitProcess
GetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
HeapCreate
GetTimeZoneInformation
GetACP
GetOEMCP
IsValidCodePage
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
HeapReAlloc
GetConsoleCP
GetConsoleMode
FlushFileBuffers
GetModuleHandleW
user32
SetTimer
RegisterWindowMessageW
DestroyIcon
LoadIconW
SystemParametersInfoW
GetSystemMetrics
MsgWaitForMultipleObjects
GetMessageW
SendMessageCallbackW
IsRectEmpty
SetRectEmpty
PeekMessageW
AllowSetForegroundWindow
ExitWindowsEx
CloseDesktop
OpenDesktopW
SetThreadDesktop
GetThreadDesktop
SetProcessWindowStation
GetProcessWindowStation
CloseWindowStation
OpenWindowStationW
GetSysColor
GetAsyncKeyState
WaitForInputIdle
MsgWaitForMultipleObjectsEx
GetKeyState
advapi32
RegCreateKeyExW
RegCloseKey
RegOpenKeyExW
RevertToSelf
DuplicateToken
ImpersonateLoggedOnUser
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
ConvertStringSecurityDescriptorToSecurityDescriptorW
AdjustTokenPrivileges
LookupPrivilegeValueW
GetUserNameW
RegQueryInfoKeyW
RegEnumValueW
RegDeleteValueW
RegSetValueExW
RegDeleteKeyW
CheckTokenMembership
OpenProcessToken
RegQueryValueExW
RegEnumKeyExW
shell32
SHGetFolderPathW
CommandLineToArgvW
ShellExecuteW
ShellExecuteExW
SHGetSpecialFolderPathW
ExtractIconW
ole32
FreePropVariantArray
PropVariantClear
CoTaskMemAlloc
CreateStreamOnHGlobal
CoUninitialize
CoInitialize
CLSIDFromString
CoCreateInstance
ProgIDFromCLSID
oleaut32
SysFreeString
SysAllocString
version
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
secur32
GetUserNameExW
Sections
.text Size: 297KB - Virtual size: 296KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 103KB - Virtual size: 103KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 45KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1.2MB - Virtual size: 1.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE