Static task
static1
Behavioral task
behavioral1
Sample
58a47afd033eb019c7beb4bfbe7ff7b195bd8fcb438dee48f7534fdf4393e034.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
58a47afd033eb019c7beb4bfbe7ff7b195bd8fcb438dee48f7534fdf4393e034.exe
Resource
win10v2004-20230915-en
General
-
Target
58a47afd033eb019c7beb4bfbe7ff7b195bd8fcb438dee48f7534fdf4393e034
-
Size
395KB
-
MD5
dace8da973bc2abe1dc1308701b26c6a
-
SHA1
c3c864ec731e21e785898efafae2c01b7c30a0f0
-
SHA256
58a47afd033eb019c7beb4bfbe7ff7b195bd8fcb438dee48f7534fdf4393e034
-
SHA512
96993e08b5c9089b592598dd2356d3dff991bac0ee98b3ae3f6888fc88f2649013dbe86ec0b46420173c7882cb4c44a20ed1b4c1b68750d0e86f3a89832c1f8f
-
SSDEEP
6144:SL9zvyW9eI8xU7x/1l+js/eVhQ1JKGXn42st67GhAOForL/g5fdgYe0I/9:SL9zqWN8+1QjsWVhMH3eRh8rDUfE0I1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 58a47afd033eb019c7beb4bfbe7ff7b195bd8fcb438dee48f7534fdf4393e034
Files
-
58a47afd033eb019c7beb4bfbe7ff7b195bd8fcb438dee48f7534fdf4393e034.exe windows:5 windows x86
872232bbe91f525142852b85b2329d45
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
_TrackMouseEvent
ord17
kernel32
GetProcessHeap
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCPInfo
GetOEMCP
IsValidCodePage
FindFirstFileExA
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CreateDirectoryW
HeapReAlloc
DecodePointer
GetStringTypeW
GetModuleFileNameA
GetConsoleCP
SetFilePointerEx
ReadConsoleW
GetConsoleMode
GetFileType
HeapFree
GetACP
WriteFile
GetStdHandle
GetModuleHandleExW
ExitProcess
GetCurrentDirectoryW
GetCurrentDirectoryA
SetCurrentDirectoryA
SetEnvironmentVariableA
GetFullPathNameA
GetDriveTypeW
ReadFile
LoadLibraryExW
TlsFree
TlsSetValue
TlsGetValue
SetStdHandle
FlushFileBuffers
CreateFileW
WriteConsoleW
HeapSize
FindNextFileA
FindFirstFileA
DeleteFileA
GetLocalTime
FindClose
GetLastError
GetShortPathNameA
MulDiv
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GetComputerNameA
GetWindowsDirectoryA
GetSystemDirectoryA
GetCommandLineA
GetSystemInfo
WinExec
GlobalMemoryStatus
GetVersion
WideCharToMultiByte
LoadLibraryA
MultiByteToWideChar
GetProcAddress
FreeLibrary
GetTickCount
HeapAlloc
Sleep
TlsAlloc
EncodePointer
SetLastError
SetEndOfFile
RaiseException
RtlUnwind
TerminateProcess
GetCurrentProcess
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
GetStartupInfoW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
GetModuleHandleW
CreateEventW
WaitForSingleObjectEx
ResetEvent
SetEvent
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
EnterCriticalSection
CloseHandle
user32
SetWindowTextA
GetSystemMetrics
GetDC
ReleaseDC
SendMessageA
CreateWindowExA
DestroyWindow
ShowWindow
SetWindowPos
GetAsyncKeyState
SetActiveWindow
GetWindowRect
MessageBoxA
ShowCursor
SetCursorPos
LoadIconA
LoadCursorA
FillRect
GetSysColor
AdjustWindowRectEx
InvalidateRect
EndPaint
BeginPaint
GetCursorPos
GetActiveWindow
MoveWindow
UnregisterClassA
RegisterClassA
PostQuitMessage
DefWindowProcA
SetClassLongA
GetClassLongA
SetWindowLongA
GetWindowLongA
InflateRect
DrawFocusRect
GetClientRect
TabbedTextOutA
DrawTextA
IsWindowEnabled
EnableWindow
GetFocus
SetFocus
GetDlgCtrlID
IsDlgButtonChecked
GetDlgItemTextA
CallWindowProcA
PostMessageA
FindWindowA
MsgWaitForMultipleObjects
MapVirtualKeyA
PeekMessageA
DispatchMessageA
TranslateMessage
GetMessageA
EnumDisplaySettingsA
ChangeDisplaySettingsA
gdi32
MoveToEx
SetDIBColorTable
CreateDIBSection
GetTextMetricsA
SetStretchBltMode
StretchBlt
SetPixel
SetBkColor
SelectPalette
RealizePalette
Rectangle
LineTo
GetTextExtentPoint32A
GetPixel
Ellipse
DeleteDC
CreatePen
CreatePalette
CreateCompatibleDC
SetTextColor
SetBkMode
SelectObject
GetStockObject
DeleteObject
CreateSolidBrush
CreateFontIndirectA
BitBlt
GetDeviceCaps
comdlg32
GetSaveFileNameA
GetOpenFileNameA
ChooseColorA
advapi32
GetUserNameA
shell32
ShellExecuteA
ShellExecuteExA
SHGetSpecialFolderPathA
ole32
CLSIDFromProgID
CoInitializeEx
OleInitialize
OleUninitialize
CreateStreamOnHGlobal
CoCreateInstance
IIDFromString
CoUninitialize
oleaut32
SafeArrayUnaccessData
OleLoadPicture
SafeArrayCopy
VariantInit
VariantClear
SysAllocString
SysFreeString
SafeArrayCreate
SafeArrayGetDim
SafeArrayPutElement
SafeArrayGetElement
VariantChangeType
VariantCopyInd
VariantCopy
SafeArrayGetVartype
SafeArrayGetLBound
SafeArrayGetUBound
SysAllocStringByteLen
SafeArrayAccessData
msimg32
GradientFill
winmm
timeBeginPeriod
timeEndPeriod
sndPlaySoundA
timeGetTime
mciSendStringA
timeGetDevCaps
Sections
.text Size: 270KB - Virtual size: 269KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 69KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ