Static task
static1
Behavioral task
behavioral1
Sample
cd0b22104d53c81d9004acaa60081e18422e259f11b1b1d3cf2cd6952fa2a2b7.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
cd0b22104d53c81d9004acaa60081e18422e259f11b1b1d3cf2cd6952fa2a2b7.exe
Resource
win10v2004-20230915-en
General
-
Target
cd0b22104d53c81d9004acaa60081e18422e259f11b1b1d3cf2cd6952fa2a2b7
-
Size
212KB
-
MD5
4026358964166c04d49f6481075a5907
-
SHA1
82b1157dc30b38d411b5125d55b7065778f915ab
-
SHA256
cd0b22104d53c81d9004acaa60081e18422e259f11b1b1d3cf2cd6952fa2a2b7
-
SHA512
db51c8b3020605b949908d4217f0be7e9aaf572954bf880959069532465227e278cccdde316888fffe5de0ff255ee2085d4205817d196dd4cdc8ae497cfa5b06
-
SSDEEP
3072:y+xb49w7XbeIBUBurJaB8TATSjpi1d3bQeea1mqx7h9XBwr73MNs2axotZahM2T+:D+y7beIBUBoJaUlS9bH62/NAhM3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource cd0b22104d53c81d9004acaa60081e18422e259f11b1b1d3cf2cd6952fa2a2b7
Files
-
cd0b22104d53c81d9004acaa60081e18422e259f11b1b1d3cf2cd6952fa2a2b7.exe windows:4 windows x86
c430325d36509e1373542795299751dd
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
RtlUnwind
HeapReAlloc
RaiseException
HeapSize
SetUnhandledExceptionFilter
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
IsDebuggerPresent
ExitProcess
Sleep
VirtualAlloc
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetLocaleInfoA
GetConsoleCP
GetConsoleMode
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
GetStartupInfoW
GetProcessHeap
HeapAlloc
HeapFree
SetErrorMode
lstrlenA
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GetThreadLocale
InterlockedIncrement
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GlobalFlags
WritePrivateProfileStringW
InterlockedDecrement
GlobalFindAtomW
CompareStringW
LoadLibraryA
GetVersionExA
FormatMessageW
LocalFree
lstrlenW
MulDiv
GetModuleHandleA
GlobalUnlock
GlobalFree
FreeResource
GetCurrentProcessId
GetLastError
SetLastError
GlobalAddAtomW
CloseHandle
GlobalDeleteAtom
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
GetModuleFileNameW
GetVersion
EnumResourceLanguagesW
lstrcmpA
GetLocaleInfoW
LoadLibraryW
WideCharToMultiByte
MultiByteToWideChar
InterlockedExchange
GlobalLock
lstrcmpW
GlobalAlloc
FreeLibrary
GetModuleHandleW
GetProcAddress
FindResourceW
LoadResource
LockResource
SizeofResource
GetCurrentProcess
user32
GetSysColorBrush
LoadCursorW
ShowWindow
MoveWindow
SetWindowTextW
IsDialogMessageW
RegisterWindowMessageW
SendDlgItemMessageW
SendDlgItemMessageA
WinHelpW
GetCapture
GetClassLongW
GetClassNameW
SetPropW
GetPropW
RemovePropW
SetFocus
GetWindowTextW
GetForegroundWindow
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
MapWindowPoints
UpdateWindow
GetMenu
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
AdjustWindowRectEx
CopyRect
PtInRect
GetDlgCtrlID
DefWindowProcW
CallWindowProcW
SetWindowLongW
SetWindowPos
SystemParametersInfoA
GetWindowPlacement
GetWindow
GetMenuItemID
GetMenuItemCount
GetSubMenu
GetSysColor
EndPaint
BeginPaint
ReleaseDC
GetDC
ClientToScreen
ScreenToClient
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapW
GetFocus
ModifyMenuW
GetMenuState
EnableMenuItem
CheckMenuItem
GetDesktopWindow
SetActiveWindow
CreateDialogIndirectParamW
DestroyWindow
IsWindow
GetDlgItem
GetNextDlgTabItem
EndDialog
UnregisterClassW
DestroyMenu
GetWindowThreadProcessId
GetParent
GetWindowLongW
GetLastActivePopup
IsWindowEnabled
MessageBoxW
SetCursor
SetWindowsHookExW
CallNextHookEx
GetMessageW
TranslateMessage
DispatchMessageW
GetActiveWindow
GetKeyState
PeekMessageW
GetCursorPos
ValidateRect
PostMessageW
PostQuitMessage
GetWindowRect
GetClientRect
EnableWindow
IsWindowVisible
DrawIcon
GetSystemMetrics
SendMessageW
LoadIconW
IsIconic
SetForegroundWindow
ExitWindowsEx
UnregisterClassA
gdi32
GetStockObject
TextOutW
GetDeviceCaps
CreateFontIndirectW
DeleteDC
DPtoLP
RectVisible
PtVisible
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
GetObjectW
DeleteObject
GetClipBox
SetMapMode
SetTextColor
SetBkColor
RestoreDC
SaveDC
CreateBitmap
ExtTextOutW
winspool.drv
ClosePrinter
DocumentPropertiesW
OpenPrinterW
advapi32
RegOpenKeyW
RegSetValueExW
RegCreateKeyExW
RegQueryValueW
OpenProcessToken
RegEnumKeyW
RegDeleteKeyW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
AdjustTokenPrivileges
LookupPrivilegeValueW
shell32
ShellExecuteW
SHGetSpecialFolderPathW
comctl32
InitCommonControlsEx
shlwapi
PathFindFileNameW
PathFindExtensionW
oleaut32
VariantClear
VariantChangeType
VariantInit
Sections
.text Size: 136KB - Virtual size: 135KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ