Static task
static1
Behavioral task
behavioral1
Sample
b4a6cc1f9877abd7180f52dcab781c610f2c88c3465c4f80e25bd04eda733146.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
b4a6cc1f9877abd7180f52dcab781c610f2c88c3465c4f80e25bd04eda733146.exe
Resource
win10v2004-20230703-en
General
-
Target
b4a6cc1f9877abd7180f52dcab781c610f2c88c3465c4f80e25bd04eda733146
-
Size
13.4MB
-
MD5
3bef293a95b584f0a51c8083980a36a6
-
SHA1
7ac93dba86deaf57f480e8581186d089756687c2
-
SHA256
b4a6cc1f9877abd7180f52dcab781c610f2c88c3465c4f80e25bd04eda733146
-
SHA512
61ee8ac7d2dc096ce1436ac0b9f0f719ecf207099f0e650813d6c828cb2ca698d846898506915561f83774ebcf9d350541ee84a047622accdd25d3ec5d0de09f
-
SSDEEP
393216:dUCUOLH9J4ZG5FHNAMzXea/LbWRG+h56ZvaHzOwnv:dUCUOLHx5FH1zXe8Z+h56ZCHq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b4a6cc1f9877abd7180f52dcab781c610f2c88c3465c4f80e25bd04eda733146
Files
-
b4a6cc1f9877abd7180f52dcab781c610f2c88c3465c4f80e25bd04eda733146.exe windows x86
e3d3364943db4d828dbe791a29233ccc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapReAlloc
HeapSize
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
SetUnhandledExceptionFilter
VirtualAlloc
IsBadWritePtr
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
SetStdHandle
CompareStringA
CompareStringW
SetEnvironmentVariableA
MultiByteToWideChar
lstrlenA
GetProfileStringA
InterlockedExchange
InterlockedDecrement
LocalFree
LocalAlloc
FormatMessageA
CreateMutexA
GetStartupInfoA
WideCharToMultiByte
Sleep
GetProcAddress
LoadLibraryA
lstrcatA
LoadResource
FindResourceA
LockResource
GlobalFree
GlobalUnlock
GlobalLock
GetModuleHandleA
lstrcpyA
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
lstrcmpiA
GlobalGetAtomNameA
GetCurrentThreadId
GetVersion
FreeLibrary
InterlockedIncrement
GetModuleFileNameA
FileTimeToSystemTime
FileTimeToLocalFileTime
lstrlenW
GetThreadLocale
SetLastError
MulDiv
GetCurrentThread
lstrcmpA
TerminateProcess
GetACP
GetLocalTime
GetSystemTime
GetTimeZoneInformation
HeapFree
HeapAlloc
RaiseException
ExitProcess
GetCommandLineA
RtlUnwind
GetFileTime
GetFileSize
GetFileAttributesA
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
CreateFileA
GetCurrentProcess
DuplicateHandle
WritePrivateProfileStringA
GetOEMCP
GetCPInfo
GetProcessVersion
TlsGetValue
LocalReAlloc
TlsSetValue
EnterCriticalSection
GlobalReAlloc
LeaveCriticalSection
GlobalHandle
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
SizeofResource
GlobalFlags
lstrcpynA
GetTickCount
CloseHandle
GlobalAlloc
GetLastError
user32
SetRect
CopyAcceleratorTableA
GetSysColorBrush
GetDesktopWindow
PtInRect
GetClassNameA
InflateRect
DestroyMenu
LoadStringA
RegisterClipboardFormatA
MapDialogRect
SetWindowContextHelpId
GetMessageA
TranslateMessage
ValidateRect
GetCursorPos
SetCursor
PostQuitMessage
GrayStringA
DrawTextA
TabbedTextOutA
EndPaint
BeginPaint
GetWindowDC
ClientToScreen
CharNextA
GetDC
ReleaseDC
GetMenuCheckMarkDimensions
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
IsDlgButtonChecked
PostMessageA
SendDlgItemMessageA
MapWindowPoints
GetSysColor
PeekMessageA
DispatchMessageA
GetFocus
SetFocus
AdjustWindowRectEx
ScreenToClient
CopyRect
IsWindowVisible
GetNextDlgGroupItem
GetTopWindow
EnableWindow
GetClientRect
SendMessageA
wsprintfA
HideCaret
ShowCaret
ExcludeUpdateRgn
DrawFocusRect
InvalidateRect
DefDlgProcA
IsChild
GetCapture
WinHelpA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetWindowTextLengthA
GetWindowTextA
MessageBeep
PostThreadMessageA
CharUpperA
GetDlgCtrlID
GetKeyState
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
SetPropA
UnhookWindowsHookEx
GetPropA
CallWindowProcA
IsWindowUnicode
MessageBoxA
LoadIconA
SetTimer
AppendMenuA
GetSystemMenu
DrawIcon
GetSystemMetrics
IsIconic
BringWindowToTop
GetWindowRect
UpdateWindow
LoadCursorA
LoadBitmapA
IsWindowEnabled
GetDlgItem
GetWindowLongA
GetParent
DestroyWindow
CreateDialogIndirectParamA
IsWindow
SetActiveWindow
GetActiveWindow
EndDialog
GetNextDlgTabItem
GetWindowPlacement
SystemParametersInfoA
IntersectRect
OffsetRect
RegisterWindowMessageA
SetWindowPos
SetWindowLongA
GetWindow
SetForegroundWindow
GetForegroundWindow
RemovePropA
DefWindowProcA
GetMessageTime
GetMessagePos
GetLastActivePopup
wvsprintfA
gdi32
SelectObject
SetBkMode
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
IntersectClipRect
RestoreDC
DeleteObject
GetViewportExtEx
GetWindowExtEx
CreateSolidBrush
PtVisible
RectVisible
ExtTextOutA
Escape
GetMapMode
CreateFontIndirectA
DPtoLP
LPtoDP
SaveDC
GetStockObject
GetBkColor
GetTextColor
PatBlt
CreateBitmap
SetBkColor
SetTextColor
GetClipBox
CreateCompatibleDC
BitBlt
GetObjectA
GetDeviceCaps
GetTextMetricsA
StartDocA
StartPage
TextOutA
EndPage
EndDoc
CreateDIBitmap
GetTextExtentPointA
DeleteDC
comdlg32
PrintDlgA
GetFileTitleA
winspool.drv
ClosePrinter
OpenPrinterA
DocumentPropertiesA
advapi32
RegCreateKeyExA
RegOpenKeyExA
RegSetValueExA
RegCloseKey
comctl32
ord17
ImageList_Destroy
oledlg
ord8
ole32
CoTaskMemFree
CoTaskMemAlloc
CoFreeUnusedLibraries
OleInitialize
CoCreateInstance
OleRun
CLSIDFromString
CoGetClassObject
StgOpenStorageOnILockBytes
CLSIDFromProgID
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
CoRegisterMessageFilter
CoRevokeClassObject
OleFlushClipboard
OleIsCurrentClipboard
OleUninitialize
olepro32
ord253
oleaut32
VariantInit
SysFreeString
VariantCopy
VariantChangeType
SysAllocString
SysAllocStringByteLen
VarBstrFromCy
SysAllocStringLen
VariantTimeToSystemTime
SysStringLen
GetErrorInfo
VariantClear
wininet
InternetReadFile
FtpOpenFileA
InternetConnectA
InternetOpenA
InternetCrackUrlA
FtpGetFileSize
InternetCloseHandle
Sections
.text Size: 300KB - Virtual size: 297KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 76KB - Virtual size: 74KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 28KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 13.0MB - Virtual size: 13.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ