Static task
static1
Behavioral task
behavioral1
Sample
18c49726d92c6a6dc84a6cfb2e5dc9ecfc52f761070fa0e24a109715215ced58.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
18c49726d92c6a6dc84a6cfb2e5dc9ecfc52f761070fa0e24a109715215ced58.exe
Resource
win10v2004-20230915-en
General
-
Target
18c49726d92c6a6dc84a6cfb2e5dc9ecfc52f761070fa0e24a109715215ced58
-
Size
460KB
-
MD5
a3163a605a0d14e12693e7c1090b3dc3
-
SHA1
8aac6e3864e863b09aa508a814b8ef4bfdaa62d8
-
SHA256
18c49726d92c6a6dc84a6cfb2e5dc9ecfc52f761070fa0e24a109715215ced58
-
SHA512
fa7c8cc434f1e9bc16549bf4f1890b350b870269c94904af8aa38e9e99fcbdb38e66c51cf807c8ba81f026945ff1bbd219368cc7bd2db24ef4d041b6a155505c
-
SSDEEP
12288:tTenbQ/SecoPoHWX3ANhkWKOh/FwM02Ea0+2mQqtFYto2XMqto1ruy:tobQj7PoHWX3ANhkWKOh/FwM02Ea0+2u
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 18c49726d92c6a6dc84a6cfb2e5dc9ecfc52f761070fa0e24a109715215ced58
Files
-
18c49726d92c6a6dc84a6cfb2e5dc9ecfc52f761070fa0e24a109715215ced58.exe windows:4 windows x86
7e0ec685857991fe3ee22642c0fb5ef0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
RtlUnwind
RaiseException
HeapSize
TerminateProcess
GetACP
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
SetUnhandledExceptionFilter
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
Sleep
IsBadCodePtr
InterlockedExchange
FlushFileBuffers
SetFilePointer
ReadFile
GetCurrentProcess
GetOEMCP
GetCPInfo
MultiByteToWideChar
WideCharToMultiByte
InterlockedIncrement
GlobalFlags
lstrcmpA
GetProcessVersion
LoadLibraryA
FreeLibrary
GlobalGetAtomNameA
lstrcmpiA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
GetProcAddress
GetLastError
SetLastError
GetVersion
InterlockedDecrement
TlsGetValue
LocalReAlloc
TlsSetValue
EnterCriticalSection
GlobalAlloc
SetStdHandle
GlobalReAlloc
GlobalLock
LeaveCriticalSection
TlsFree
GlobalHandle
GlobalUnlock
GlobalFree
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
LocalFree
LocalAlloc
GetCurrentThreadId
lstrlenA
lstrcpynA
lstrcpyA
lstrcatA
SetErrorMode
GetStartupInfoA
CreateProcessA
WaitForSingleObject
GetPrivateProfileStringA
CreateFileA
WriteFile
CloseHandle
GetModuleFileNameA
IsBadReadPtr
HeapFree
HeapReAlloc
HeapAlloc
ExitProcess
GetProcessHeap
GetCommandLineA
FreeEnvironmentStringsW
GetModuleHandleA
user32
AdjustWindowRectEx
SetFocus
GetSysColor
MapWindowPoints
PostMessageA
LoadIconA
SetWindowTextA
IsWindowEnabled
LoadCursorA
GetSysColorBrush
ReleaseDC
GetDC
GetClassNameA
PtInRect
ClientToScreen
PostQuitMessage
DestroyMenu
TabbedTextOutA
DrawTextA
GrayStringA
CopyRect
EnableWindow
GetTopWindow
GetCapture
WinHelpA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetDlgItem
GetWindowTextA
GetDlgCtrlID
DestroyWindow
CreateWindowExA
GetClassLongA
SetPropA
GetPropA
CallWindowProcA
RemovePropA
DefWindowProcA
GetMessageTime
GetMessagePos
GetLastActivePopup
GetForegroundWindow
GetWindow
GetWindowLongA
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetSystemMetrics
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetParent
GetNextDlgTabItem
LoadStringA
UnhookWindowsHookEx
MessageBoxA
wsprintfA
SetWindowsHookExA
GetClientRect
DispatchMessageA
SendMessageA
GetKeyState
CallNextHookEx
PeekMessageA
SetForegroundWindow
gdi32
SelectObject
GetStockObject
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
RestoreDC
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SaveDC
DeleteDC
DeleteObject
GetDeviceCaps
GetObjectA
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
comctl32
ord17
Sections
.text Size: 72KB - Virtual size: 70KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 360KB - Virtual size: 374KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 664B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ