Static task
static1
Behavioral task
behavioral1
Sample
a243302bca05207c1f64ddd57c0912debf6a5ec9cfbaa2e2fa2b6d9ae60e103d.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
a243302bca05207c1f64ddd57c0912debf6a5ec9cfbaa2e2fa2b6d9ae60e103d.exe
Resource
win10v2004-20230915-en
General
-
Target
a243302bca05207c1f64ddd57c0912debf6a5ec9cfbaa2e2fa2b6d9ae60e103d
-
Size
361KB
-
MD5
01ed193541787f3d4901240944e49b79
-
SHA1
2c2d20c89b2e6acca6449206b923a727d1148345
-
SHA256
a243302bca05207c1f64ddd57c0912debf6a5ec9cfbaa2e2fa2b6d9ae60e103d
-
SHA512
e439a8f124821a17f3830108e9463d95424ca153c804d3d461263a353d9aa5bbf4692c45ff6b17c4b58c6a9a2a6e92041699143b898495f9ba683a51fd8aa0a5
-
SSDEEP
3072:/4DSm2tXzeH5Swig05wgTwsdSLSdyamWpOMWZOdtYeJ6PdZX3r9ib/sSfvEo:3m2tXCH5Swig4Es8QpOMWZ2yhPdZN
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a243302bca05207c1f64ddd57c0912debf6a5ec9cfbaa2e2fa2b6d9ae60e103d
Files
-
a243302bca05207c1f64ddd57c0912debf6a5ec9cfbaa2e2fa2b6d9ae60e103d.exe windows:5 windows x86
a6fb639af8cd14dd87adc46bf652bf7f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mfc100u
ord11838
ord11801
ord3763
ord2844
ord8273
ord11081
ord6156
ord2339
ord11116
ord5468
ord8346
ord6117
ord897
ord1266
ord5801
ord2185
ord6870
ord6373
ord430
ord985
ord3380
ord3241
ord3368
ord3248
ord3371
ord3366
ord6722
ord7006
ord4805
ord1310
ord12951
ord12413
ord8434
ord9557
ord13305
ord7914
ord2614
ord2765
ord2337
ord4440
ord4439
ord4441
ord4438
ord4437
ord11167
ord12608
ord5557
ord10304
ord10307
ord10159
ord8070
ord8062
ord8659
ord6975
ord7876
ord4151
ord7210
ord3410
ord4478
ord3436
ord2617
ord7901
ord3749
ord2748
ord8266
ord5809
ord921
ord265
ord266
ord9235
ord6869
ord890
ord1292
ord13956
ord7176
ord1990
ord1986
ord1895
ord13797
ord12753
ord7616
ord13568
ord850
ord1592
ord345
ord923
ord11021
ord3958
ord11473
ord11235
ord13047
ord2407
ord2005
ord4086
ord385
ord948
ord950
ord9525
ord6713
ord3627
ord868
ord1269
ord6140
ord9328
ord5118
ord11845
ord11209
ord11240
ord9498
ord7391
ord11236
ord11228
ord5261
ord3416
ord13571
ord13569
ord13572
ord13567
ord13570
ord7179
ord11469
ord13267
ord10976
ord14162
ord1739
ord7126
ord11864
ord3625
ord3684
ord8530
ord13387
ord7108
ord13381
ord11477
ord11476
ord2164
ord4744
ord13854
ord11784
ord7548
ord7624
ord5830
ord8347
ord8372
ord11164
ord2417
ord12606
ord5556
ord2756
ord2980
ord2981
ord10412
ord10058
ord8179
ord11123
ord6358
ord6719
ord404
ord965
ord280
ord2629
ord5264
ord285
ord14203
ord12136
ord10067
ord10969
ord13434
ord1476
ord2542
ord11374
ord421
ord979
ord10960
ord5231
ord11333
ord2528
ord13398
ord1492
ord3413
ord422
ord980
ord4991
ord5563
ord3628
ord5652
ord8349
ord9329
ord13822
ord13804
ord13950
ord13939
ord13962
ord13743
ord14216
ord13738
ord14129
ord10019
ord12684
ord2504
ord4981
ord5538
ord8220
ord3421
ord10296
ord8334
ord11706
ord4950
ord11509
ord14211
ord8615
ord2375
ord11880
ord11085
ord3670
ord3623
ord13309
ord4764
ord4755
ord971
ord14130
ord13890
ord3422
ord13870
ord13901
ord13871
ord7524
ord13214
ord11683
ord1478
ord1440
ord5637
ord11778
ord10597
ord462
ord1010
ord10990
ord11299
ord2532
ord11494
ord4519
ord1861
ord1480
ord5846
ord970
ord7903
ord3754
ord5900
ord3482
ord1905
ord2188
ord4359
ord13181
ord6374
ord6723
ord433
ord987
ord1264
ord863
ord865
ord1267
ord8435
ord12487
ord7112
ord11094
ord4511
ord10557
ord12266
ord12764
ord5600
ord2062
ord9081
ord8313
ord13415
ord11353
ord13396
ord2057
ord11330
ord8350
ord5275
ord12554
ord8374
ord2216
ord3993
ord11168
ord11073
ord7384
ord2766
ord7559
ord4444
ord4445
ord5469
ord11404
ord1529
ord12563
ord5280
ord12561
ord5279
ord10447
ord5296
ord7986
ord10804
ord10799
ord4756
ord3407
ord4084
ord10511
ord9470
ord6036
ord6346
ord3369
ord3255
ord3978
ord7347
ord7512
ord3258
ord3261
ord423
ord981
ord4197
ord4216
ord4963
ord1944
ord12659
ord2577
ord3397
ord11940
ord7973
ord4360
ord8598
ord9140
ord9139
ord10185
ord8151
ord10164
ord8710
ord10750
ord8063
ord8073
ord10160
ord8657
ord9080
ord9075
ord8645
ord8655
ord8640
ord10308
ord10305
ord7474
ord5558
ord12610
ord2887
ord2884
ord7385
ord2418
ord14146
ord14148
ord14147
ord14145
ord14149
ord14132
ord14059
ord14060
ord8277
ord11080
ord3402
ord10937
ord13380
ord8112
ord11210
ord6247
ord10045
ord8393
ord2853
ord12724
ord11246
ord11244
ord1501
ord1508
ord1514
ord1512
ord1519
ord4388
ord4425
ord4396
ord4408
ord4404
ord4400
ord4430
ord4421
ord4392
ord4434
ord4413
ord4379
ord4383
ord4416
ord3999
ord14067
ord3992
ord2665
ord13382
ord7109
ord13388
ord6155
ord10725
ord12557
ord5276
ord2338
ord11115
ord3491
ord2952
ord2951
ord2852
ord11159
ord4642
ord4923
ord5115
ord8483
ord4901
ord5143
ord4645
ord4794
ord4623
ord6931
ord6932
ord6922
ord4792
ord7393
ord9333
ord8363
ord9561
ord4452
ord1934
ord1748
ord7618
ord3866
ord7934
ord902
ord10663
ord10254
ord10256
ord9335
ord9137
ord10181
ord8149
ord10161
ord8658
ord10156
ord2335
ord11093
ord12038
ord1479
ord2155
ord290
ord9562
ord296
ord8478
ord3174
ord8433
ord6721
ord5862
ord3446
ord6859
ord1275
ord1987
ord410
ord6363
ord3846
ord2064
ord2068
ord13891
ord5855
ord1312
ord286
ord9496
ord4290
ord2089
ord873
ord6642
ord1298
ord12886
ord1300
msvcr100
memcpy
memset
__CxxFrameHandler3
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_crt_debugger_hook
_controlfp_s
_invoke_watson
_except_handler4_common
?terminate@@YAXXZ
_onexit
_lock
__dllonexit
_unlock
__set_app_type
_fmode
_commode
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_wcmdln
exit
_XcptFilter
_exit
_cexit
__wgetmainargs
_amsg_exit
_endthreadex
_beginthreadex
_wtoi
wcsstr
memmove_s
memcpy_s
ceil
_purecall
rand
srand
fread
fread_s
ftell
fseek
fclose
fwrite
_wfopen_s
_vsnwprintf_s
printf
wcstol
_time64
_localtime64_s
wcsftime
_CxxThrowException
kernel32
GetLastError
ReadFile
PurgeComm
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
QueryPerformanceCounter
SetUnhandledExceptionFilter
DecodePointer
EncodePointer
GetStartupInfoW
HeapSetInformation
InterlockedCompareExchange
InterlockedExchange
MultiByteToWideChar
SetCommState
GetCommState
SetThreadPriority
GetPrivateProfileIntW
GetPrivateProfileStringW
EscapeCommFunction
InterlockedDecrement
InterlockedIncrement
GetModuleFileNameW
WideCharToMultiByte
DeleteFileW
SetThreadUILanguage
GetVersionExW
ResetEvent
WaitCommEvent
ClearCommBreak
CreateThread
CreateFileW
CreateEventW
DeleteCriticalSection
InitializeCriticalSection
GetCommModemStatus
SetupComm
SetCommTimeouts
GetCommTimeouts
LeaveCriticalSection
EnterCriticalSection
CloseHandle
TerminateThread
Sleep
FlushFileBuffers
SetCommMask
SetEvent
WriteFile
WaitForSingleObject
GetTickCount
GetOverlappedResult
ClearCommError
user32
wsprintfW
KillTimer
SetTimer
GetParent
GetWindowRect
EnableWindow
GetSubMenu
LoadMenuW
UpdateWindow
PostThreadMessageW
PostMessageW
IsWindow
RedrawWindow
GetSysColor
SendMessageW
gdi32
CreateSolidBrush
shell32
ShellExecuteW
DragQueryFileW
DragFinish
DragAcceptFiles
comctl32
InitCommonControlsEx
shlwapi
PathFileExistsW
oleaut32
VariantTimeToSystemTime
SystemTimeToVariantTime
VarUdateFromDate
VarDateFromStr
wininet
InternetGetConnectedState
setupapi
SetupDiEnumDeviceInfo
SetupDiGetDeviceRegistryPropertyW
SetupDiGetClassDevsW
SetupDiDestroyDeviceInfoList
Sections
.text Size: 106KB - Virtual size: 105KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 46KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 184KB - Virtual size: 183KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ