Static task
static1
Behavioral task
behavioral1
Sample
dce1c133c52ab96cf8bc146ecca0f93f11569afee9d5fb5beb3164b20d26b183.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
dce1c133c52ab96cf8bc146ecca0f93f11569afee9d5fb5beb3164b20d26b183.exe
Resource
win10v2004-20231020-en
General
-
Target
dce1c133c52ab96cf8bc146ecca0f93f11569afee9d5fb5beb3164b20d26b183
-
Size
181KB
-
MD5
4cb4d9d6b9ee62c975bb2433e115336f
-
SHA1
393b5ceec92a6871f9e2f564d1f9feae8eeacf8c
-
SHA256
dce1c133c52ab96cf8bc146ecca0f93f11569afee9d5fb5beb3164b20d26b183
-
SHA512
3386802a50c8981121e48797c99490e56dbebe830a5f81fa86f9c299a2c0a4aa338c2cdeb7fb3d2b2c5f6aa90d5b289345d2adcb0bf2920967620c9f9420e83d
-
SSDEEP
3072:BnXDKtAZk0+Ve0+tzgy/6VKK0gzXd2wWdJZO1GdPTC7KzUOZS4:BnXD7k0+4ztzLKNXpYO1wTXdZS4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource dce1c133c52ab96cf8bc146ecca0f93f11569afee9d5fb5beb3164b20d26b183
Files
-
dce1c133c52ab96cf8bc146ecca0f93f11569afee9d5fb5beb3164b20d26b183.exe windows:4 windows x86
b6f61a1c15d44316635c753d9f8cc42a
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalGetAtomNameA
GetCommandLineA
RaiseException
HeapAlloc
HeapFree
ExitProcess
TerminateProcess
HeapReAlloc
HeapSize
RtlUnwind
GetStartupInfoA
GetOEMCP
GetTimeZoneInformation
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
GlobalAddAtomA
GetACP
GetCPInfo
FileTimeToLocalFileTime
DuplicateHandle
VirtualAlloc
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadWritePtr
IsBadCodePtr
SetStdHandle
GetLocaleInfoA
GetLocaleInfoW
LCMapStringA
LCMapStringW
CompareStringA
CompareStringW
SetEnvironmentVariableA
FindResourceA
LoadResource
FindFirstFileA
WinExec
GetModuleHandleA
FileTimeToSystemTime
SetErrorMode
WritePrivateProfileStringA
GetVersion
GetProcessVersion
TlsGetValue
LocalReAlloc
TlsSetValue
EnterCriticalSection
GlobalReAlloc
LeaveCriticalSection
GlobalHandle
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
LocalAlloc
SizeofResource
GlobalFlags
SetFileTime
SetFileAttributesA
SystemTimeToFileTime
LocalFileTimeToFileTime
GetFileTime
GetFileSize
lstrcmpiA
GetFullPathNameA
GetVolumeInformationA
FindClose
lstrcpyA
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GetCurrentProcess
HeapCreate
lstrcpynA
GetModuleFileNameA
GetPrivateProfileStringA
GetLastError
SetLastError
GetSystemDirectoryA
VirtualFree
FreeLibrary
GlobalAlloc
GlobalDeleteAtom
lstrcmpA
GetCurrentThread
LocalFree
MulDiv
MultiByteToWideChar
WideCharToMultiByte
lstrlenA
InterlockedIncrement
InterlockedDecrement
lstrcatA
GetCurrentThreadId
GlobalLock
GlobalUnlock
GlobalFree
LockResource
SetUnhandledExceptionFilter
GetStdHandle
HeapDestroy
CopyFileA
CreateFileA
GetProcAddress
LoadLibraryA
CloseHandle
GetFileAttributesA
GetProfileStringA
CreateDirectoryA
SetCurrentDirectoryA
GetWindowsDirectoryA
user32
PostQuitMessage
CharUpperA
LoadStringA
DestroyMenu
GetDC
ReleaseDC
GetWindowDC
BeginPaint
EndPaint
TabbedTextOutA
DrawTextA
LoadBitmapA
GetMenuCheckMarkDimensions
ShowOwnedPopups
SetCursor
GetCursorPos
ValidateRect
TranslateMessage
GetMessageA
GetClassNameA
PtInRect
ClientToScreen
GetDesktopWindow
LoadCursorA
GetSysColorBrush
ReleaseCapture
GrayStringA
WindowFromPoint
SetRectEmpty
LoadAcceleratorsA
TranslateAcceleratorA
LoadMenuA
SetMenu
ReuseDDElParam
UnpackDDElParam
InvalidateRect
BringWindowToTop
IntersectRect
InflateRect
PostMessageA
UpdateWindow
SendDlgItemMessageA
SystemParametersInfoA
MapWindowPoints
GetSysColor
DispatchMessageA
PeekMessageA
GetFocus
SetFocus
AdjustWindowRectEx
EqualRect
SetMenuItemBitmaps
CopyRect
IsWindowVisible
ModifyMenuA
GetMenuState
GetTopWindow
GetCapture
WinHelpA
GetClassInfoA
GetSubMenu
GetMenuItemID
GetMenu
GetWindowTextLengthA
GetWindowTextA
GetDlgCtrlID
GetKeyState
DefWindowProcA
CreateWindowExA
SetWindowsHookExA
SetPropA
CallNextHookEx
UnhookWindowsHookEx
GetLastActivePopup
GetForegroundWindow
SetForegroundWindow
GetPropA
RemovePropA
CallWindowProcA
GetMessageTime
GetMessagePos
GetWindow
GetWindowRect
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
GetNextDlgTabItem
EndDialog
GetActiveWindow
SetActiveWindow
IsWindow
CreateDialogIndirectParamA
DestroyWindow
GetParent
GetWindowLongA
GetDlgItem
IsWindowEnabled
FindWindowA
wsprintfA
MessageBoxA
EnableWindow
IsIconic
GetSystemMetrics
CheckMenuItem
GetClientRect
DrawIcon
EnableMenuItem
ShowWindow
SetWindowTextA
IsDialogMessageA
ScreenToClient
DeferWindowPos
BeginDeferWindowPos
EndDeferWindowPos
SendMessageA
LoadIconA
GetMenuItemCount
RegisterClassA
DrawFocusRect
ExcludeUpdateRgn
DefDlgProcA
IsWindowUnicode
CharNextA
OffsetRect
UnregisterClassA
ShowCaret
HideCaret
gdi32
SetBkColor
CreateBitmap
DeleteDC
SaveDC
RestoreDC
SelectObject
GetStockObject
SetBkMode
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetClipBox
IntersectClipRect
SetTextColor
DeleteObject
GetDeviceCaps
CreateSolidBrush
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
GetTextExtentPointA
PatBlt
CreateDIBitmap
BitBlt
CreateCompatibleDC
GetObjectA
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
advapi32
RegCreateKeyExA
RegOpenKeyExA
RegCloseKey
RegCreateKeyA
RegSetValueExA
RegOpenKeyA
RegQueryValueExA
shell32
DragQueryFileA
DragFinish
comctl32
ImageList_Destroy
ord17
Sections
.text Size: 110KB - Virtual size: 110KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ