Static task
static1
Behavioral task
behavioral1
Sample
4304e038656f1705995b08e0a5b7a4ef7b020d492f14d73a365f36aeaae2cfa8.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
4304e038656f1705995b08e0a5b7a4ef7b020d492f14d73a365f36aeaae2cfa8.exe
Resource
win10v2004-20230915-en
General
-
Target
4304e038656f1705995b08e0a5b7a4ef7b020d492f14d73a365f36aeaae2cfa8
-
Size
405KB
-
MD5
9305bbe05c27b2431e1e22bf361581fa
-
SHA1
720bc064233b737171c8db90078dbcd9bb581bf4
-
SHA256
4304e038656f1705995b08e0a5b7a4ef7b020d492f14d73a365f36aeaae2cfa8
-
SHA512
53ad2e09889929d8a70004651711d40de38caba700055aed1bccccf376ef9269e8959f8245b6921c8fbe1f1bf93cf76ebad3e4c74c87b1bea91bbddb1178d246
-
SSDEEP
6144:I2RSiqupV9iE9CBIW2CbS4GxfKjTaYT7ZaJ87ryraeVWudy4fqnzfxx:IOe0xMN7Zaq6rawfu
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4304e038656f1705995b08e0a5b7a4ef7b020d492f14d73a365f36aeaae2cfa8
Files
-
4304e038656f1705995b08e0a5b7a4ef7b020d492f14d73a365f36aeaae2cfa8.exe windows:6 windows x86
747487aa75cb4a3edd92435011008c39
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WriteFile
FileTimeToSystemTime
SetErrorMode
FileTimeToLocalFileTime
GetFileAttributesExW
SystemTimeToTzSpecificLocalTime
ResetEvent
WaitForSingleObjectEx
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeSListHead
SetFilePointerEx
GetConsoleMode
GetConsoleCP
SetStdHandle
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetCPInfo
IsValidCodePage
FindNextFileW
FindFirstFileExW
GetTimeZoneInformation
GetStringTypeW
LCMapStringW
GetFileType
ExitProcess
GetStdHandle
HeapQueryInformation
GetModuleHandleExW
GetCommandLineW
RtlUnwind
OutputDebugStringW
GetVolumeInformationW
GetFullPathNameW
FlushFileBuffers
FindFirstFileW
CreateFileW
DeleteFileW
GlobalFlags
GetUserDefaultUILanguage
GetLocaleInfoW
CompareStringW
LocalReAlloc
LocalAlloc
GlobalHandle
GlobalReAlloc
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSection
FormatMessageW
LocalFree
GlobalFree
GlobalUnlock
GlobalFindAtomW
GetSystemDirectoryW
EncodePointer
GetCurrentProcessId
GlobalAddAtomW
WritePrivateProfileStringW
GetPrivateProfileStringW
GetPrivateProfileIntW
CreateEventW
SetEvent
FindResourceW
lstrcmpW
lstrcmpA
GlobalDeleteAtom
GlobalLock
GlobalAlloc
SizeofResource
LockResource
LoadResource
LoadLibraryExW
FreeLibrary
GetVersionExW
GetCurrentThreadId
LoadLibraryW
GetProcAddress
GetModuleHandleW
GetModuleHandleA
GetModuleFileNameW
InitializeCriticalSectionAndSpinCount
SetLastError
OutputDebugStringA
WideCharToMultiByte
MultiByteToWideChar
DeleteCriticalSection
DecodePointer
HeapAlloc
RaiseException
HeapReAlloc
HeapSize
InitializeCriticalSectionEx
LeaveCriticalSection
EnterCriticalSection
HeapFree
GetACP
GetCurrentProcessorNumber
GetCommandLineA
GetCurrentProcess
VirtualAlloc
IsDebuggerPresent
GetLastError
GetEnvironmentStringsW
IsSystemResumeAutomatic
GetUserDefaultLangID
GetSystemDefaultUILanguage
GetLargePageMinimum
GetThreadLocale
GetOEMCP
GetCurrentThread
GetSystemDefaultLangID
GetThreadUILanguage
GetErrorMode
GetProcessHeap
GetTickCount64
CloseHandle
FindClose
GetStartupInfoW
WriteConsoleW
LoadLibraryA
user32
SetWindowTextW
ShowWindow
GetMonitorInfoW
MonitorFromWindow
WinHelpW
LoadIconW
UnhookWindowsHookEx
GetTopWindow
GetClassNameW
GetClassLongW
SetWindowLongW
PtInRect
CopyRect
GetSysColor
MapWindowPoints
ScreenToClient
AdjustWindowRectEx
GetWindowRect
RemovePropW
GetPropW
SetPropW
RedrawWindow
EndPaint
BeginPaint
SetForegroundWindow
UpdateWindow
GetMenuItemCount
GetMenuItemID
GetSubMenu
GetMenu
GetDlgCtrlID
GetDlgItem
IsIconic
EndDeferWindowPos
DeferWindowPos
BeginDeferWindowPos
SetWindowPos
DestroyWindow
IsMenu
IsWindow
SetTimer
GetClassInfoExW
GetClassInfoW
RegisterClassW
CallWindowProcW
DefWindowProcW
GetMessagePos
RegisterWindowMessageW
GetWindow
GetWindowTextW
GetScrollPos
GetLastActivePopup
AnyPopup
GetMenuCheckMarkDimensions
GetOpenClipboardWindow
CreateMenu
GetWindowThreadProcessId
GetWindowLongW
MessageBoxW
IsWindowEnabled
EnableWindow
SetCursor
CallNextHookEx
SetWindowsHookExW
GetCursorPos
ValidateRect
GetKeyState
GetActiveWindow
IsWindowVisible
PeekMessageW
DispatchMessageW
TranslateMessage
ClientToScreen
LoadCursorW
SetMenu
GetForegroundWindow
GetCapture
GetKBCodePage
GetMessageExtraInfo
GetClipboardViewer
CountClipboardFormats
DestroyCaret
GetShellWindow
GetDialogBaseUnits
IsProcessDPIAware
GetMessageTime
SetProcessDPIAware
GetCursor
GetFocus
EmptyClipboard
UnregisterClassW
GetClientRect
SetRectEmpty
OffsetRect
GetParent
PostMessageW
PostQuitMessage
SendMessageW
CheckMenuItem
EnableMenuItem
SetMenuItemBitmaps
SetMenuItemInfoW
LoadBitmapW
GetMessageW
DestroyMenu
CharUpperW
GetSysColorBrush
GetSystemMetrics
ReleaseDC
GetDC
TabbedTextOutW
GrayStringW
DrawTextExW
DrawTextW
InvalidateRect
CreateWindowExW
KillTimer
RealChildWindowFromPoint
gdi32
Escape
GetClipBox
GetStockObject
PtVisible
RectVisible
RestoreDC
SaveDC
SelectObject
SetMapMode
TextOutW
ExtTextOutW
SetViewportExtEx
SetViewportOrgEx
SetWindowExtEx
OffsetViewportOrgEx
ScaleViewportExtEx
ScaleWindowExtEx
DeleteObject
GetDeviceCaps
SetTextColor
SetBkColor
CreateBitmap
GdiFlush
DeleteDC
winspool.drv
DocumentPropertiesW
OpenPrinterW
ClosePrinter
advapi32
RegEnumValueW
RegQueryValueW
RegEnumKeyW
RegSetValueExW
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExW
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
shell32
ShellExecuteW
shlwapi
PathFindFileNameW
PathIsUNCW
PathStripToRootW
PathFindExtensionW
ole32
CoTaskMemFree
CoInitialize
CoCreateInstance
CoCreateGuid
CoUninitialize
CoFreeUnusedLibraries
OleUninitialize
oleaut32
VariantChangeType
VariantClear
VariantInit
SysAllocString
SysFreeString
oleacc
LresultFromObject
CreateStdAccessibleObject
Sections
.text Size: 188KB - Virtual size: 188KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 57KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.giats Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 135KB - Virtual size: 135KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ