Static task
static1
Behavioral task
behavioral1
Sample
803ef009af4c31d2462f47dd3cdfc672d72eef651e59a7016ef9a6c3334c2f99.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
803ef009af4c31d2462f47dd3cdfc672d72eef651e59a7016ef9a6c3334c2f99.exe
Resource
win10v2004-20230915-en
General
-
Target
803ef009af4c31d2462f47dd3cdfc672d72eef651e59a7016ef9a6c3334c2f99
-
Size
131KB
-
MD5
f91e028d4534ecc08543b9b7b8e5f4c7
-
SHA1
604ade3c02d81d4fd6021e30d16131b5ba655a3a
-
SHA256
803ef009af4c31d2462f47dd3cdfc672d72eef651e59a7016ef9a6c3334c2f99
-
SHA512
c516229411bda5bfae104c89d316cc8c828fa711bccd6cae02b120397d691caca2d5857149a599ea263ebde9df423597ed6c2c0a82617362444e192d0b0d9059
-
SSDEEP
768:UHm8kLyvwd5D8VSBsfrR3FRQAIxKl5jjv9VbIa3JmqV8GW8yayKCBSY3F8+ElvT:AmxOYd5uaWkAIxKLvfbIkyGW8IKs9UJ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 803ef009af4c31d2462f47dd3cdfc672d72eef651e59a7016ef9a6c3334c2f99
Files
-
803ef009af4c31d2462f47dd3cdfc672d72eef651e59a7016ef9a6c3334c2f99.exe windows:5 windows x86
1cfb94505a6c28b3fe6c12cfb00a4a8d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_cexit
_XcptFilter
_exit
_c_exit
advapi32
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
kernel32
GetCurrentThreadId
GetSystemTimeAsFileTime
CreateDirectoryA
CreateMutexA
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
QueryPerformanceCounter
GetStartupInfoA
GetCurrentProcessId
CloseHandle
SetEndOfFile
SetFilePointer
CreateFileA
SetLastError
lstrcpyA
GetLastError
ReadFile
WriteFile
GetTempFileNameA
GetTempPathA
lstrlenA
SetFileAttributesA
lstrcmpiA
SetFileTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
lstrcatA
GetFileSize
lstrcpynA
RemoveDirectoryA
FindClose
FindNextFileA
DeleteFileA
lstrcmpA
FindFirstFileA
WritePrivateProfileStringA
CopyFileA
FlushFileBuffers
Sleep
WaitForSingleObject
SetEvent
GetTickCount
CreateThread
CreateEventA
GetPrivateProfileStringA
ConvertDefaultLocale
GetVersionExA
GetSystemInfo
GetPrivateProfileIntA
SetCurrentDirectoryA
GetCommandLineA
FreeLibrary
GetProcAddress
LoadLibraryExA
ExitProcess
GetModuleHandleA
GetPrivateProfileSectionA
ReleaseMutex
TerminateProcess
user32
GetDlgItemTextA
CharNextA
DialogBoxParamA
RegisterWindowMessageA
GetClassInfoExA
RegisterClassExA
GetWindowLongA
EnableMenuItem
wsprintfA
PostMessageA
SetWindowTextA
SendDlgItemMessageA
ShowWindow
KillTimer
SetFocus
EndDialog
SetWindowLongA
SetDlgItemTextA
MoveWindow
GetSystemMetrics
SystemParametersInfoA
GetWindowRect
cmpbk32
PhoneBookUnload
PhoneBookMergeChanges
PhoneBookLoad
PhoneBookFreeFilter
PhoneBookParseInfoA
cmutil
CmFmtMsgA
?Log@CmLogFile@@QAAXW4_CMLOG_ITEM@@ZZ
CmStrrchrA
CmLoadSmallIconA
CmLoadIconA
?Stop@CmLogFile@@QAEJXZ
?Start@CmLogFile@@QAEJH@Z
?SetParams@CmLogFile@@QAEJHKPBD@Z
?Init@CmLogFile@@QAEJPAUHINSTANCE__@@HPBD@Z
GetOSVersion
??0CmLogFile@@QAE@XZ
?DeInit@CmLogFile@@QAEJXZ
CmBuildFullPathFromRelativeA
CmStrchrA
CmRealloc
CmStrCpyAllocA
CmMalloc
CmFree
comctl32
ord17
cabinet
ord23
ord21
ord20
ord22
rasapi32
RasEnumConnectionsA
wininet
InternetSetOptionA
InternetOpenA
InternetConnectA
FtpFindFirstFileA
InternetFindNextFileA
InternetCloseHandle
FtpOpenFileA
InternetReadFile
HttpQueryInfoA
HttpSendRequestA
HttpOpenRequestA
InternetOpenUrlA
InternetCrackUrlA
Sections
.text Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 172B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 109KB - Virtual size: 130KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE