Static task
static1
Behavioral task
behavioral1
Sample
4ab123b1332dd4a7138d105868a56350cd7052b7e1797f48819d989a17b52155.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
4ab123b1332dd4a7138d105868a56350cd7052b7e1797f48819d989a17b52155.exe
Resource
win10v2004-20230831-en
General
-
Target
4ab123b1332dd4a7138d105868a56350cd7052b7e1797f48819d989a17b52155
-
Size
1.2MB
-
MD5
88e28043c442aa9f8c3d220121edaafc
-
SHA1
5c8acb0755fe6282d86999aee9aefb232b372c71
-
SHA256
4ab123b1332dd4a7138d105868a56350cd7052b7e1797f48819d989a17b52155
-
SHA512
7b9dff6d09f5369b34da233ffc8cfbbcc1b0db00aba746c665e37a1d7969e3cb362d43344ceba6d492b290458d57689e4ca3e36bdef63afd561b89f5c8da9899
-
SSDEEP
24576:rw1Pa4Y1Qyj+LjseMCQw2SFLHiea6vtoPx8S:oPVYeMriHieRs
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4ab123b1332dd4a7138d105868a56350cd7052b7e1797f48819d989a17b52155
Files
-
4ab123b1332dd4a7138d105868a56350cd7052b7e1797f48819d989a17b52155.exe windows x86
cc744a262f41a80fb0c1193271fffde6
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
TlsSetValue
LocalReAlloc
DeleteCriticalSection
TlsFree
InterlockedIncrement
GetCPInfo
GetOEMCP
FileTimeToLocalFileTime
GetFileAttributesA
GetFileTime
RtlUnwind
HeapFree
RaiseException
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
HeapReAlloc
GetSystemTimeAsFileTime
VirtualProtect
VirtualAlloc
VirtualQuery
GetCommandLineA
GetProcessHeap
GetStartupInfoA
ExitProcess
HeapSize
TlsAlloc
GetConsoleMode
HeapDestroy
HeapCreate
VirtualFree
SetHandleCount
GetStdHandle
GetFileType
GetACP
LCMapStringA
LCMapStringW
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTimeZoneInformation
GetStringTypeA
GetStringTypeW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
GetLocaleInfoW
SetEnvironmentVariableA
InitializeCriticalSection
GlobalHandle
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GlobalFlags
GetPrivateProfileStringA
WritePrivateProfileStringA
GetPrivateProfileIntA
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
GetCurrentProcess
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
ReadFile
GetCurrentProcessId
GetModuleFileNameA
lstrcmpA
FormatMessageA
LocalFree
MulDiv
InterlockedDecrement
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
SetLastError
lstrcmpW
GetModuleHandleA
FreeResource
UnmapViewOfFile
CreateFileMappingA
MapViewOfFile
GetFileInformationByHandle
GetLocalTime
FileTimeToSystemTime
WriteFile
SetFileTime
CreateDirectoryA
LocalFileTimeToFileTime
CloseHandle
CreateFileA
SystemTimeToFileTime
GetTickCount
Sleep
CompareStringA
CompareStringW
MultiByteToWideChar
InterlockedExchange
GetLastError
lstrlenA
GetThreadLocale
IsBadReadPtr
FreeLibrary
GetProcAddress
LoadLibraryA
VerLanguageNameA
GetVersion
RemoveDirectoryA
lstrcpyA
GlobalReAlloc
GlobalAlloc
GlobalFree
GlobalSize
GlobalLock
GlobalUnlock
WideCharToMultiByte
LoadResource
LockResource
SizeofResource
FindResourceA
CopyFileA
GlobalMemoryStatus
GetSystemInfo
CreateFileW
GetVersionExA
GetWindowsDirectoryA
GetConsoleCP
GetDiskFreeSpaceExA
user32
GetNextDlgGroupItem
MessageBeep
RegisterClipboardFormatA
PostThreadMessageA
GetMenuState
RegisterWindowMessageA
SendDlgItemMessageA
WinHelpA
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
GetFocus
SetFocus
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
DispatchMessageA
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
TrackPopupMenu
GetKeyState
SetForegroundWindow
IsWindowVisible
PostMessageA
GetMenuItemID
GetMenuItemCount
MessageBoxA
CreateWindowExA
GetClassInfoExA
RegisterClassA
InvalidateRgn
AdjustWindowRectEx
EqualRect
CopyRect
PtInRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetWindowLongA
SetWindowPos
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
GetWindow
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
IsWindow
GetWindowLongA
GetDlgItem
IsWindowEnabled
GetParent
GetNextDlgTabItem
EndDialog
GetDesktopWindow
CharUpperA
LoadCursorA
KillTimer
InvalidateRect
UpdateWindow
ReleaseDC
GetDC
ScreenToClient
ClientToScreen
GetClientRect
IsIconic
SetMenu
GetMenu
LoadMenuA
SendMessageA
ReleaseCapture
SetCapture
SetWindowContextHelpId
GetSubMenu
EnableMenuItem
CheckMenuItem
DrawIcon
SetRectEmpty
IsRectEmpty
GetCursorPos
SetCursor
GetSystemMetrics
SetCursorPos
wsprintfA
LoadIconA
EnableWindow
SetRect
CopyAcceleratorTableA
CharNextA
UnregisterClassA
GetSysColorBrush
DestroyMenu
GetSysColor
MapDialogRect
GetMessageA
TranslateMessage
ValidateRect
PostQuitMessage
GetWindowThreadProcessId
EndPaint
BeginPaint
GetWindowDC
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
SetDlgItemTextA
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetClassInfoA
ModifyMenuA
IsChild
gdi32
SaveDC
RestoreDC
SetStretchBltMode
SetMapMode
LineTo
MoveToEx
DeleteObject
GetViewportExtEx
GetWindowExtEx
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SelectObject
SetViewportOrgEx
SetBkColor
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
ExtSelectClipRgn
DeleteDC
GetStockObject
SelectPalette
CreatePen
CreateRectRgnIndirect
GetMapMode
GetBkColor
GetTextColor
GetRgnBox
SetTextColor
GetClipBox
RealizePalette
GetDeviceCaps
CreateCompatibleDC
CreatePalette
CreateCompatibleBitmap
CreateBitmap
GetObjectA
CreateDIBitmap
OffsetViewportOrgEx
GetDIBits
StretchDIBits
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
advapi32
RegDeleteValueA
RegSetValueExA
RegCreateKeyExA
RegQueryValueA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyExA
RegQueryValueExA
RegOpenKeyA
RegCloseKey
shlwapi
PathIsUNCA
PathFindExtensionA
PathStripToRootA
PathFindFileNameA
oledlg
ord8
ole32
OleInitialize
CoFreeUnusedLibraries
OleUninitialize
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CLSIDFromString
CoRevokeClassObject
CoTaskMemAlloc
CoTaskMemFree
OleIsCurrentClipboard
OleFlushClipboard
CoRegisterMessageFilter
CLSIDFromProgID
oleaut32
VariantClear
VariantInit
SysAllocStringLen
SysStringLen
SysFreeString
SysAllocStringByteLen
VariantCopy
SafeArrayDestroy
VariantTimeToSystemTime
SystemTimeToVariantTime
OleCreateFontIndirect
SysAllocString
VariantChangeType
Sections
.text Size: 684KB - Virtual size: 683KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 124KB - Virtual size: 120KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 436KB - Virtual size: 432KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 524B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ