Static task
static1
Behavioral task
behavioral1
Sample
dd88ce0c409d42123071cc329a81545497329f93934dd1b5c5a8540623e52443.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
dd88ce0c409d42123071cc329a81545497329f93934dd1b5c5a8540623e52443.exe
Resource
win10v2004-20230915-en
General
-
Target
dd88ce0c409d42123071cc329a81545497329f93934dd1b5c5a8540623e52443
-
Size
808KB
-
MD5
01cbbafe80da209282e475120604ae3b
-
SHA1
01cf1c196ab79aad331783f92b7c30fa32897154
-
SHA256
dd88ce0c409d42123071cc329a81545497329f93934dd1b5c5a8540623e52443
-
SHA512
dff28d8d3c9a75270f78e48ca60b986ec6668a5659849869556cdadfbe06cdaa5f269a9d3c748e53c68da7aed26d870e1ee0843e009240879236ab94555970ed
-
SSDEEP
24576:xBpqiIAuM2nqsWiGj0wfw4Rbj3brMAZZW2oY31:nzekFRH3PMD2o8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource dd88ce0c409d42123071cc329a81545497329f93934dd1b5c5a8540623e52443
Files
-
dd88ce0c409d42123071cc329a81545497329f93934dd1b5c5a8540623e52443.exe windows:4 windows x86
4fbe6855fa8602aaec250f26c6d10ebc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegQueryValueExA
RegOpenKeyA
RegCreateKeyExA
RegOpenKeyExA
RegSetValueExA
RegDeleteValueA
RegDeleteKeyA
RegCloseKey
comctl32
ord17
dsound
ord1
gdi32
SetBkMode
SetTextColor
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetClipBox
IntersectClipRect
RestoreDC
SetBkColor
GetDeviceCaps
CreateSolidBrush
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
PatBlt
GetObjectA
SaveDC
CreateBitmap
DeleteObject
CreateCompatibleDC
SelectObject
BitBlt
DeleteDC
GetTextExtentPointA
CreateDIBitmap
GetStockObject
kernel32
GlobalReAlloc
TlsSetValue
LocalReAlloc
TlsGetValue
SetErrorMode
GlobalFlags
GetProcessVersion
GetCPInfo
GetOEMCP
RtlUnwind
RaiseException
ExitProcess
TerminateProcess
GetStartupInfoA
GetCommandLineA
HeapAlloc
HeapFree
SetEnvironmentVariableA
GetTimeZoneInformation
GetSystemTime
GetLocalTime
HeapReAlloc
GetACP
HeapSize
TlsFree
SetUnhandledExceptionFilter
LCMapStringA
LCMapStringW
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
CompareStringA
CompareStringW
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
SetStdHandle
GlobalHandle
TlsAlloc
LocalAlloc
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
FileTimeToLocalFileTime
FileTimeToSystemTime
SetFileTime
SystemTimeToFileTime
LocalFileTimeToFileTime
GetFileTime
GetVersion
lstrcatA
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalFree
WritePrivateProfileStringA
GetPrivateProfileStringA
GetPrivateProfileIntA
GlobalUnlock
MulDiv
GetModuleHandleA
SetLastError
GlobalLock
GlobalAlloc
GlobalDeleteAtom
lstrcmpA
GetCurrentThread
GetCurrentThreadId
GetModuleFileNameA
lstrcmpiA
GetFullPathNameA
lstrcpynA
GetVolumeInformationA
FindFirstFileA
FindClose
lstrcpyA
SetEndOfFile
UnlockFile
GetProfileStringA
LockFile
FlushFileBuffers
WriteFile
ReadFile
GetCurrentProcess
DuplicateHandle
LocalFree
MultiByteToWideChar
lstrlenA
InterlockedDecrement
InterlockedIncrement
SetFilePointer
GetDriveTypeA
GetFileAttributesA
SetFileAttributesA
WideCharToMultiByte
CreateFileA
GetFileSize
FindResourceA
SizeofResource
LoadResource
LockResource
QueryPerformanceFrequency
QueryPerformanceCounter
GetWindowsDirectoryA
CreateMutexA
GetLastError
GetVersionExA
LoadLibraryA
GetProcAddress
FreeLibrary
Sleep
CloseHandle
shell32
ShellExecuteA
user32
GetTopWindow
AdjustWindowRectEx
GetSysColor
MapWindowPoints
SendDlgItemMessageA
IsDialogMessageA
SetWindowTextA
LoadStringA
GetClassNameA
PtInRect
GetSysColorBrush
InflateRect
DestroyMenu
InvalidateRect
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetWindowTextLengthA
GetWindowTextA
GetDlgCtrlID
GetClassLongA
SetPropA
GetPropA
CallWindowProcA
RemovePropA
GetMessageTime
GetMessagePos
GetForegroundWindow
GetWindow
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
IntersectRect
GetWindowPlacement
GetWindowRect
CopyRect
EndDialog
SetActiveWindow
CreateDialogIndirectParamA
GrayStringA
DrawTextA
TabbedTextOutA
GetWindowDC
ClientToScreen
ScreenToClient
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetMessageA
GetKeyState
CallNextHookEx
ValidateRect
IsWindowVisible
SetWindowsHookExA
GetParent
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
PostQuitMessage
CharUpperA
wsprintfA
UnhookWindowsHookEx
CharToOemBuffA
OemToCharBuffA
LoadImageA
BeginPaint
EndPaint
GetCursorPos
SetCursor
PostMessageA
IsIconic
GetClientRect
DrawIcon
SendMessageA
GetDlgItem
LoadIconA
SystemParametersInfoA
EnableWindow
PeekMessageA
TranslateMessage
DispatchMessageA
MsgWaitForMultipleObjects
MessageBoxA
ShowCaret
ExcludeUpdateRgn
DrawFocusRect
DefDlgProcA
CharNextA
IsWindowUnicode
ShowCursor
ChangeDisplaySettingsA
EnumDisplaySettingsA
GetDC
ReleaseDC
IsWindow
DestroyWindow
DefWindowProcA
LoadCursorA
GetCapture
WinHelpA
GetClassInfoA
RegisterClassA
OffsetRect
GetMenu
RegisterClassExA
GetClassInfoExA
GetSystemMetrics
CreateWindowExA
ShowWindow
UpdateWindow
SetForegroundWindow
SetFocus
HideCaret
UnregisterClassA
GetActiveWindow
winmm
timeGetTime
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
comdlg32
GetFileTitleA
d3d8
Direct3DCreate8
Sections
.text Size: 289KB - Virtual size: 292KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 45KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 91KB - Virtual size: 128KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 374KB - Virtual size: 376KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 6KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.yvs Size: - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE