Static task
static1
Behavioral task
behavioral1
Sample
dc396e87e728a6b90aa637f3955791fc8e3599d604292bad4dbaa24ea94a2a30.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
dc396e87e728a6b90aa637f3955791fc8e3599d604292bad4dbaa24ea94a2a30.exe
Resource
win10v2004-20231020-en
General
-
Target
dc396e87e728a6b90aa637f3955791fc8e3599d604292bad4dbaa24ea94a2a30
-
Size
181KB
-
MD5
7c8258385cf123211dcfdb074f25ba87
-
SHA1
b8bf69e563c757c75da4d27f54af0307419aba49
-
SHA256
dc396e87e728a6b90aa637f3955791fc8e3599d604292bad4dbaa24ea94a2a30
-
SHA512
6ee94c20823ce5ef32f8b123588c9cfcb63172c172538a8548546c57522b1b126ee5a143eb20bcf608f1821dbeca09e5ca66794e768bd9f31e1e048d23e769b6
-
SSDEEP
3072:YnXDKtAZk0+Ve0+tzgy/6VKK0gzXd2wWdJZO1GdPTC7KzUOZS4:YnXD7k0+4ztzLKNXpYO1wTXdZS4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource dc396e87e728a6b90aa637f3955791fc8e3599d604292bad4dbaa24ea94a2a30
Files
-
dc396e87e728a6b90aa637f3955791fc8e3599d604292bad4dbaa24ea94a2a30.exe windows:4 windows x86
b6f61a1c15d44316635c753d9f8cc42a
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalGetAtomNameA
GetCommandLineA
RaiseException
HeapAlloc
HeapFree
ExitProcess
TerminateProcess
HeapReAlloc
HeapSize
RtlUnwind
GetStartupInfoA
GetOEMCP
GetTimeZoneInformation
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
GlobalAddAtomA
GetACP
GetCPInfo
FileTimeToLocalFileTime
DuplicateHandle
VirtualAlloc
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadWritePtr
IsBadCodePtr
SetStdHandle
GetLocaleInfoA
GetLocaleInfoW
LCMapStringA
LCMapStringW
CompareStringA
CompareStringW
SetEnvironmentVariableA
FindResourceA
LoadResource
FindFirstFileA
WinExec
GetModuleHandleA
FileTimeToSystemTime
SetErrorMode
WritePrivateProfileStringA
GetVersion
GetProcessVersion
TlsGetValue
LocalReAlloc
TlsSetValue
EnterCriticalSection
GlobalReAlloc
LeaveCriticalSection
GlobalHandle
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
LocalAlloc
SizeofResource
GlobalFlags
SetFileTime
SetFileAttributesA
SystemTimeToFileTime
LocalFileTimeToFileTime
GetFileTime
GetFileSize
lstrcmpiA
GetFullPathNameA
GetVolumeInformationA
FindClose
lstrcpyA
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GetCurrentProcess
HeapCreate
lstrcpynA
GetModuleFileNameA
GetPrivateProfileStringA
GetLastError
SetLastError
GetSystemDirectoryA
VirtualFree
FreeLibrary
GlobalAlloc
GlobalDeleteAtom
lstrcmpA
GetCurrentThread
LocalFree
MulDiv
MultiByteToWideChar
WideCharToMultiByte
lstrlenA
InterlockedIncrement
InterlockedDecrement
lstrcatA
GetCurrentThreadId
GlobalLock
GlobalUnlock
GlobalFree
LockResource
SetUnhandledExceptionFilter
GetStdHandle
HeapDestroy
CopyFileA
CreateFileA
GetProcAddress
LoadLibraryA
CloseHandle
GetFileAttributesA
GetProfileStringA
CreateDirectoryA
SetCurrentDirectoryA
GetWindowsDirectoryA
user32
PostQuitMessage
CharUpperA
LoadStringA
DestroyMenu
GetDC
ReleaseDC
GetWindowDC
BeginPaint
EndPaint
TabbedTextOutA
DrawTextA
LoadBitmapA
GetMenuCheckMarkDimensions
ShowOwnedPopups
SetCursor
GetCursorPos
ValidateRect
TranslateMessage
GetMessageA
GetClassNameA
PtInRect
ClientToScreen
GetDesktopWindow
LoadCursorA
GetSysColorBrush
ReleaseCapture
GrayStringA
WindowFromPoint
SetRectEmpty
LoadAcceleratorsA
TranslateAcceleratorA
LoadMenuA
SetMenu
ReuseDDElParam
UnpackDDElParam
InvalidateRect
BringWindowToTop
IntersectRect
InflateRect
PostMessageA
UpdateWindow
SendDlgItemMessageA
SystemParametersInfoA
MapWindowPoints
GetSysColor
DispatchMessageA
PeekMessageA
GetFocus
SetFocus
AdjustWindowRectEx
EqualRect
SetMenuItemBitmaps
CopyRect
IsWindowVisible
ModifyMenuA
GetMenuState
GetTopWindow
GetCapture
WinHelpA
GetClassInfoA
GetSubMenu
GetMenuItemID
GetMenu
GetWindowTextLengthA
GetWindowTextA
GetDlgCtrlID
GetKeyState
DefWindowProcA
CreateWindowExA
SetWindowsHookExA
SetPropA
CallNextHookEx
UnhookWindowsHookEx
GetLastActivePopup
GetForegroundWindow
SetForegroundWindow
GetPropA
RemovePropA
CallWindowProcA
GetMessageTime
GetMessagePos
GetWindow
GetWindowRect
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
GetNextDlgTabItem
EndDialog
GetActiveWindow
SetActiveWindow
IsWindow
CreateDialogIndirectParamA
DestroyWindow
GetParent
GetWindowLongA
GetDlgItem
IsWindowEnabled
FindWindowA
wsprintfA
MessageBoxA
EnableWindow
IsIconic
GetSystemMetrics
CheckMenuItem
GetClientRect
DrawIcon
EnableMenuItem
ShowWindow
SetWindowTextA
IsDialogMessageA
ScreenToClient
DeferWindowPos
BeginDeferWindowPos
EndDeferWindowPos
SendMessageA
LoadIconA
GetMenuItemCount
RegisterClassA
DrawFocusRect
ExcludeUpdateRgn
DefDlgProcA
IsWindowUnicode
CharNextA
OffsetRect
UnregisterClassA
ShowCaret
HideCaret
gdi32
SetBkColor
CreateBitmap
DeleteDC
SaveDC
RestoreDC
SelectObject
GetStockObject
SetBkMode
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetClipBox
IntersectClipRect
SetTextColor
DeleteObject
GetDeviceCaps
CreateSolidBrush
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
GetTextExtentPointA
PatBlt
CreateDIBitmap
BitBlt
CreateCompatibleDC
GetObjectA
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
advapi32
RegCreateKeyExA
RegOpenKeyExA
RegCloseKey
RegCreateKeyA
RegSetValueExA
RegOpenKeyA
RegQueryValueExA
shell32
DragQueryFileA
DragFinish
comctl32
ImageList_Destroy
ord17
Sections
.text Size: 110KB - Virtual size: 110KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ