Static task
static1
Behavioral task
behavioral1
Sample
c84aa2f3d8944ab602f563d277d5a4499d2534d6b6fbfb9f4582461eada71020.exe
Resource
win7-20230712-en
General
-
Target
c84aa2f3d8944ab602f563d277d5a4499d2534d6b6fbfb9f4582461eada71020
-
Size
623KB
-
MD5
3f6ff5de31b46c65256f870c8b71850f
-
SHA1
fe1bee44f9d6c4e4a70e95c87f71f27a79e07dcf
-
SHA256
c84aa2f3d8944ab602f563d277d5a4499d2534d6b6fbfb9f4582461eada71020
-
SHA512
c7f24e25f70244b36fad577eab252c84efa092e5bffe82a060c3df8317bb6adba8f08b56025d3e604eddc95a57ddb5ae237a126336bd701ebd2e5275395a460d
-
SSDEEP
12288:b7gf8KcnsazeV1Z5n89zohgwmIKGxtWuC7x0XbT:b7gf8KaeVVMzo2luRbT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c84aa2f3d8944ab602f563d277d5a4499d2534d6b6fbfb9f4582461eada71020
Files
-
c84aa2f3d8944ab602f563d277d5a4499d2534d6b6fbfb9f4582461eada71020.exe windows x86
6e34d3533a37b20ff8c6be155f2092a0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalAddAtomA
SetLastError
GetLastError
GetCurrentProcessId
FreeResource
GlobalFree
GlobalUnlock
MulDiv
MultiByteToWideChar
LocalFree
FormatMessageA
GetModuleFileNameW
InterlockedDecrement
GetVersionExA
lstrcmpW
GlobalFindAtomA
GlobalGetAtomNameA
WritePrivateProfileStringA
GlobalFlags
LocalAlloc
LeaveCriticalSection
TlsGetValue
EnterCriticalSection
GlobalReAlloc
InitializeCriticalSection
TlsAlloc
TlsSetValue
LocalReAlloc
DeleteCriticalSection
TlsFree
InterlockedIncrement
FlushFileBuffers
SetEndOfFile
GetCurrentProcess
FindClose
FindFirstFileA
GetFullPathNameA
GetModuleHandleW
GetCPInfo
GetOEMCP
FileTimeToSystemTime
SetErrorMode
FileTimeToLocalFileTime
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
RtlUnwind
Sleep
ExitProcess
HeapFree
HeapAlloc
GetCommandLineA
GetStartupInfoA
ExitThread
CreateThread
VirtualAlloc
HeapReAlloc
HeapSize
GetConsoleCP
GetConsoleMode
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetACP
IsValidCodePage
HeapCreate
VirtualFree
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetTimeZoneInformation
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetProcessHeap
CompareStringW
SetEnvironmentVariableA
SleepEx
VerifyVersionInfoA
VerSetConditionMask
GetSystemDirectoryA
PeekNamedPipe
WaitForMultipleObjects
ExpandEnvironmentStringsA
WaitForSingleObject
GlobalDeleteAtom
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
EnumResourceLanguagesA
GetModuleFileNameA
GetLocaleInfoA
LoadLibraryA
CompareStringA
InterlockedExchange
GlobalLock
lstrcmpA
GlobalAlloc
FreeLibrary
GetModuleHandleA
GetProcAddress
GetFileInformationByHandle
GetDriveTypeA
WriteFile
SetFileTime
GetCurrentDirectoryA
GetFileAttributesA
CreateDirectoryA
LocalFileTimeToFileTime
lstrcpyA
lstrlenA
lstrcatA
SystemTimeToFileTime
ReadFile
CloseHandle
CreateFileA
SetFilePointer
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
SizeofResource
GetTempPathA
GetTickCount
GlobalHandle
DeleteFileA
user32
IsDialogMessageA
SetWindowTextA
ShowWindow
TabbedTextOutA
DrawTextA
DrawTextExA
GrayStringA
ClientToScreen
GetDC
ReleaseDC
BeginPaint
EndPaint
LoadCursorA
GetSysColorBrush
UnregisterClassA
DestroyMenu
GetWindowRect
GetWindow
UnhookWindowsHookEx
GetMenuItemID
GetMenuItemCount
GetSubMenu
GetDesktopWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
IsWindow
GetDlgItem
GetNextDlgTabItem
EndDialog
GetWindowThreadProcessId
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
MessageBoxA
SetCursor
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
IsWindowVisible
GetKeyState
PeekMessageA
GetCursorPos
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
GetParent
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
PostMessageA
PostQuitMessage
GetCapture
GetClassLongA
GetClassNameA
SetPropA
wsprintfA
DrawIcon
GetPropA
RemovePropA
SetFocus
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetTopWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetMenu
SetForegroundWindow
UpdateWindow
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
GetSysColor
AdjustWindowRectEx
CopyRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
PtInRect
GetMenu
SetWindowLongA
GetWindowPlacement
SendMessageA
IsIconic
GetClientRect
EnableWindow
RegisterWindowMessageA
SendDlgItemMessageA
WinHelpA
SystemParametersInfoA
GetSystemMetrics
LoadIconA
SetWindowPos
shell32
ShellExecuteA
shlwapi
PathFindExtensionA
PathFindFileNameA
wldap32
ord79
ord35
ord32
ord22
ord33
ord143
ord60
ord50
ord26
ord30
ord301
ord27
ord41
ord211
ord200
ord46
ws2_32
ntohl
htonl
gethostname
ioctlsocket
listen
accept
recvfrom
sendto
getaddrinfo
freeaddrinfo
connect
socket
closesocket
getpeername
getsockopt
htons
bind
ntohs
WSACleanup
WSAStartup
WSASetLastError
__WSAFDIsSet
WSAGetLastError
select
recv
send
WSAIoctl
setsockopt
getsockname
crypt32
CertFreeCertificateContext
oleacc
LresultFromObject
CreateStdAccessibleObject
gdi32
SetMapMode
RestoreDC
SaveDC
GetObjectA
SetBkColor
SetTextColor
GetClipBox
GetStockObject
DeleteDC
ScaleWindowExtEx
SetWindowExtEx
CreateBitmap
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
DeleteObject
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SelectObject
SetViewportOrgEx
GetDeviceCaps
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegOpenKeyExA
CryptEncrypt
CryptDestroyKey
RegCloseKey
RegQueryValueExA
CryptGetHashParam
RegDeleteKeyA
RegEnumKeyA
RegOpenKeyA
RegQueryValueA
RegCreateKeyExA
RegSetValueExA
CryptReleaseContext
CryptGenRandom
CryptAcquireContextA
CryptCreateHash
CryptHashData
CryptDestroyHash
CryptImportKey
oleaut32
VariantClear
VariantChangeType
VariantInit
Sections
.text Size: 413KB - Virtual size: 412KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 87KB - Virtual size: 86KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 113KB - Virtual size: 113KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ