Static task
static1
Behavioral task
behavioral1
Sample
43c7f80fc34788exeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
43c7f80fc34788exeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
43c7f80fc34788exeexeexeex.exe
-
Size
337KB
-
MD5
43c7f80fc34788839f1b2b712ad5acb9
-
SHA1
995dc7d1309042a577fc484888736cc92eb2b4f3
-
SHA256
343b6ee8be9168e5d75227bb2701bed8675c8b95fe77d5f908eafac43b0bfcad
-
SHA512
eb8d9918b06b6a1bf18a7055fe9683cd0ac17b2e01c225234f0cbe72a088adfb3a69e1fb33f5b9056716eefb9734a3d569d9870ebddd20a863ce5fde75bc381e
-
SSDEEP
6144:RJvbZ9nBXiJmyeN0IqT3f368KNLLwFhYHIKkL3QvK1//fS4nuQkZWai:XvbZXVWffqvNnwFOHIbL3V1//zzLp
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 43c7f80fc34788exeexeexeex.exe
Files
-
43c7f80fc34788exeexeexeex.exe.exe windows x86
7159260cc615321402474c827a32919a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
GetDCPenColor
UpdateColors
GetFontLanguageInfo
GetPolyFillMode
GetObjectType
GetMapMode
GetTextCharsetInfo
SetPixel
GetCurrentObject
SetTextJustification
GetGraphicsMode
GetDCBrushColor
GetDeviceCaps
GetSystemPaletteUse
GetRandomRgn
GetNearestPaletteIndex
GetBkColor
GetTextCharset
GetPixelFormat
SetTextCharacterExtra
GetTextColor
SetTextAlign
user32
SetDlgItemTextA
DrawTextA
EnableWindow
MoveWindow
GetWindowContextHelpId
GetInputState
BeginPaint
ShowWindow
SetFocus
GetMenuCheckMarkDimensions
PostMessageA
CheckDlgButton
WindowFromDC
GetWindowDC
GetDlgItem
LoadIconA
GetScrollPos
GetMenuItemCount
IsWindowEnabled
GetCursor
SendMessageA
CallWindowProcA
GetPropA
SetWindowTextA
IsWindowUnicode
EndPaint
GetMenu
GetForegroundWindow
GetWindowLongA
GetMenuItemID
GetMenuContextHelpId
GetQueueStatus
GetDlgItemInt
kernel32
SetEnvironmentVariableA
CompareStringW
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
CreateFileW
HeapReAlloc
GetStringTypeW
WriteConsoleW
HeapSize
LCMapStringW
Sleep
GetTimeZoneInformation
ReadFile
MultiByteToWideChar
SetEndOfFile
SetStdHandle
GetDriveTypeW
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetModuleFileNameA
RtlUnwind
SetHandleCount
GetConsoleMode
GetConsoleCP
WideCharToMultiByte
GetLocaleInfoW
LoadLibraryW
GlobalHandle
GlobalSize
LoadResource
SizeofResource
GetModuleHandleA
GetFileTime
LocalFlags
GetProcessHeap
LockResource
MoveFileA
GetCurrentProcessId
GlobalFlags
IsDebuggerPresent
GetFileType
GetCurrentProcess
FlushFileBuffers
CloseHandle
GetVersion
GetDriveTypeA
DeleteFileA
SetFilePointer
GetProcAddress
GetLastError
GetTickCount
GetStdHandle
CreateThread
GetSystemTimeAsFileTime
UnhandledExceptionFilter
SetUnhandledExceptionFilter
EncodePointer
DecodePointer
TerminateProcess
HeapFree
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
FindFirstFileExA
HeapAlloc
GetModuleHandleW
ExitProcess
GetCommandLineA
HeapSetInformation
GetStartupInfoW
RaiseException
IsProcessorFeaturePresent
HeapCreate
HeapDestroy
GetFullPathNameA
GetFileInformationByHandle
PeekNamedPipe
CreateFileA
GetCurrentDirectoryW
SetCurrentDirectoryW
WriteFile
GetModuleFileNameW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
GetCurrentThread
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
LeaveCriticalSection
FatalAppExitA
EnterCriticalSection
SetConsoleCtrlHandler
FreeLibrary
InterlockedExchange
Sections
.text Size: 267KB - Virtual size: 266KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 42KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ