Static task
static1
Behavioral task
behavioral1
Sample
42c090c4ee96129974f84fd9d45033c7bda3e31dc66f2516e4ad45b7fce7c57e.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
42c090c4ee96129974f84fd9d45033c7bda3e31dc66f2516e4ad45b7fce7c57e.exe
Resource
win10v2004-20230703-en
General
-
Target
42c090c4ee96129974f84fd9d45033c7bda3e31dc66f2516e4ad45b7fce7c57e
-
Size
460KB
-
MD5
948eb6df6f86f441697c1fa4f4fef9d7
-
SHA1
575c93da03208588fc0c7d2fb3a8a3a86e5987b3
-
SHA256
42c090c4ee96129974f84fd9d45033c7bda3e31dc66f2516e4ad45b7fce7c57e
-
SHA512
3b87ca569c2dae57525662dc7a1f5d86245b600ab960b5d5957239438516b2dfde2f7fd3c4b2e5d1cfebd85dc8fb5cf5f12af3e1033f9b106a38a76b3a7417f5
-
SSDEEP
12288:j+Ycd+ah3fOD/kJVFGekWWAw3BtJxl7LIUshDHGbJ2lKuLruePtGmdUUK2mFZ/Rr:9cd+ahvOD/kJLGekWWAw3BtJxl7LIUsR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 42c090c4ee96129974f84fd9d45033c7bda3e31dc66f2516e4ad45b7fce7c57e
Files
-
42c090c4ee96129974f84fd9d45033c7bda3e31dc66f2516e4ad45b7fce7c57e.exe windows x86
d365c6653063ca6c1b4ed5f3d9dde158
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcatA
GetVersion
MulDiv
GetLastError
lstrcpynA
LocalAlloc
TlsAlloc
GlobalHandle
TlsFree
GlobalReAlloc
TlsSetValue
LocalReAlloc
TlsGetValue
GlobalFlags
WritePrivateProfileStringA
GetProcessVersion
GetCPInfo
GetOEMCP
SetErrorMode
FlushFileBuffers
SetEndOfFile
RtlUnwind
RaiseException
HeapReAlloc
GetStartupInfoA
GlobalGetAtomNameA
ExitProcess
LCMapStringA
LCMapStringW
CompareStringA
CompareStringW
HeapSize
GetACP
GetTimeZoneInformation
SetUnhandledExceptionFilter
GetVersionExA
HeapDestroy
HeapCreate
IsBadWritePtr
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
IsValidLocale
IsValidCodePage
GetLocaleInfoA
EnumSystemLocalesA
GetUserDefaultLCID
GetStringTypeA
GetStringTypeW
IsBadCodePtr
SetStdHandle
GetLocaleInfoW
SetEnvironmentVariableA
GlobalAddAtomA
GlobalFindAtomA
lstrcpyA
GetModuleHandleA
GlobalUnlock
GlobalFree
LockResource
FindResourceA
LoadResource
GlobalLock
GlobalAlloc
GlobalDeleteAtom
lstrcmpA
lstrcmpiA
GetCurrentThread
GetCurrentThreadId
LocalFree
InterlockedIncrement
InterlockedDecrement
LeaveCriticalSection
DeleteCriticalSection
InterlockedExchange
InitializeCriticalSection
EnterCriticalSection
GetCurrentProcess
SetFileAttributesA
TerminateProcess
GetModuleFileNameA
DeleteFileA
RemoveDirectoryA
MoveFileA
GetEnvironmentVariableA
MultiByteToWideChar
WideCharToMultiByte
Sleep
lstrlenA
HeapFree
IsBadReadPtr
SetLastError
VirtualProtect
GetSystemInfo
GetProcessHeap
HeapAlloc
FreeLibrary
GetProcAddress
LoadLibraryA
VirtualFree
VirtualAlloc
GetTickCount
UnmapViewOfFile
CreateFileMappingA
MapViewOfFile
GetFileInformationByHandle
GetFileSize
GetLocalTime
FileTimeToSystemTime
WriteFile
SetFileTime
CreateDirectoryA
LocalFileTimeToFileTime
GetCurrentDirectoryA
ReadFile
CloseHandle
CreateFileA
GetFileAttributesA
SystemTimeToFileTime
SetFilePointer
FindFirstFileA
FindNextFileA
FindClose
GetCommandLineA
CopyFileA
user32
CopyRect
AdjustWindowRectEx
SetFocus
GetSysColor
MapWindowPoints
SendDlgItemMessageA
UpdateWindow
IsDialogMessageA
SetWindowTextA
ShowWindow
ClientToScreen
GetDC
ReleaseDC
BeginPaint
EndPaint
TabbedTextOutA
DrawTextA
GrayStringA
LoadStringA
LoadCursorA
GetClassNameA
PtInRect
GetSysColorBrush
DestroyMenu
GetTopWindow
GetCapture
WinHelpA
wsprintfA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetWindowTextA
GetDlgCtrlID
CreateWindowExA
GetClassLongA
SetPropA
UnhookWindowsHookEx
GetPropA
CallWindowProcA
RemovePropA
DefWindowProcA
GetMessageTime
GetMessagePos
GetForegroundWindow
SetForegroundWindow
GetWindow
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
EndDialog
SetActiveWindow
IsWindow
CreateDialogIndirectParamA
DestroyWindow
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
GetKeyState
CallNextHookEx
ValidateRect
IsWindowVisible
PeekMessageA
GetCursorPos
SetWindowsHookExA
GetParent
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
MessageBoxA
SetCursor
PostQuitMessage
PostMessageA
IsIconic
GetSystemMetrics
GetClientRect
DrawIcon
SendMessageA
EnableWindow
LoadIconA
GetDesktopWindow
GetDlgItem
UnregisterClassA
gdi32
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetObjectA
GetDeviceCaps
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
DeleteObject
SetBkColor
SetTextColor
GetClipBox
GetStockObject
SelectObject
RestoreDC
SaveDC
CreateBitmap
DeleteDC
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegSetValueExA
RegOpenKeyExA
RegCreateKeyExA
RegCloseKey
comctl32
ord17
ole32
CoUninitialize
CoCreateInstance
CoInitialize
wininet
InternetCloseHandle
InternetOpenUrlA
InternetSetOptionA
InternetOpenA
InternetReadFile
Sections
.text Size: 368KB - Virtual size: 365KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 56KB - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ