Static task
static1
Behavioral task
behavioral1
Sample
38452e02978d8b36436755ccd30e66b87058ecf0d85fafef0a4405106413461c.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
38452e02978d8b36436755ccd30e66b87058ecf0d85fafef0a4405106413461c.exe
Resource
win10v2004-20231023-en
General
-
Target
38452e02978d8b36436755ccd30e66b87058ecf0d85fafef0a4405106413461c
-
Size
1.0MB
-
MD5
8482ca157b49a2bd46125231decc7634
-
SHA1
0bedfce66ac06cd44875cd0a470302cbbc6f8bba
-
SHA256
38452e02978d8b36436755ccd30e66b87058ecf0d85fafef0a4405106413461c
-
SHA512
68ef5b3adc2bcaf982cf8f7b9b2890ce13b5199f6e7db2a0a7bdc240935e16fe2d6cd9f7f13fb04171c81f6699cf3f201e1d317ad8ef3b5498ea947b0e0b4b3e
-
SSDEEP
24576:kYaIAz/BlNDGc7ZjLnlmiNweYQCFPIlPPPPPPPPPPPPPP:wJ/dVtNmiNwiCFPIlPPPPPPPPPPPPPP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 38452e02978d8b36436755ccd30e66b87058ecf0d85fafef0a4405106413461c
Files
-
38452e02978d8b36436755ccd30e66b87058ecf0d85fafef0a4405106413461c.exe windows:4 windows x86 arch:x86
08475b1aa068dba47b3c9ea2af2b8c60
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
TerminateProcess
HeapAlloc
GetStartupInfoA
GetCommandLineA
GetTimeZoneInformation
GetSystemTime
HeapFree
RaiseException
SetStdHandle
GetFileType
HeapReAlloc
HeapSize
GetACP
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
RtlUnwind
GetStdHandle
LCMapStringA
LCMapStringW
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
CompareStringA
CompareStringW
SetEnvironmentVariableA
FileTimeToLocalFileTime
FileTimeToSystemTime
SetErrorMode
PeekNamedPipe
GetFileInformationByHandle
GetProfileStringA
LoadLibraryExA
InterlockedCompareExchange
InterlockedExchange
GetFileTime
GetFileSize
GetFileAttributesA
GetOEMCP
GetCPInfo
GetProcessVersion
WritePrivateProfileStringA
GlobalFlags
TlsGetValue
LocalReAlloc
TlsSetValue
GlobalReAlloc
TlsFree
GlobalHandle
DeleteCriticalSection
TlsAlloc
LocalAlloc
MulDiv
SetLastError
GetFullPathNameA
lstrcpynA
GetVolumeInformationA
FindFirstFileA
FindClose
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GetCurrentProcess
DuplicateHandle
LocalFree
LoadLibraryA
FreeLibrary
GetVersion
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GetProcAddress
GlobalUnlock
GlobalFree
MultiByteToWideChar
WideCharToMultiByte
lstrlenA
InterlockedDecrement
InterlockedIncrement
CloseHandle
GetModuleFileNameA
GlobalLock
GlobalAlloc
GlobalDeleteAtom
lstrcmpiA
GetCurrentThread
GetCurrentThreadId
CreateFileA
GetComputerNameA
GetTempPathA
GetTempFileNameA
MoveFileA
Sleep
EnterCriticalSection
LeaveCriticalSection
lstrcmpA
InitializeCriticalSection
CreateThread
FindResourceA
SizeofResource
LoadResource
LockResource
TerminateThread
WaitForMultipleObjects
ResumeThread
SuspendThread
GetLocalTime
GetModuleHandleA
lstrcpyA
lstrcatA
CreateEventA
GetLastError
SetHandleCount
user32
GetDC
ReleaseDC
GetWindowDC
BeginPaint
EndPaint
TabbedTextOutA
DrawTextA
GrayStringA
LoadCursorA
GetClassNameA
PtInRect
GetSysColorBrush
LoadStringA
DestroyMenu
InflateRect
InvalidateRect
UpdateWindow
SendDlgItemMessageA
MapWindowPoints
GetSysColor
SetFocus
AdjustWindowRectEx
ScreenToClient
GetClientRect
CopyRect
GetTopWindow
GetCapture
WinHelpA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetMenuItemID
GetWindowTextLengthA
GetWindowTextA
GetDlgCtrlID
ClientToScreen
GetClassLongA
SetPropA
UnhookWindowsHookEx
GetPropA
CallWindowProcA
RemovePropA
GetMessageTime
GetMessagePos
GetForegroundWindow
SetForegroundWindow
GetWindow
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
OffsetRect
IntersectRect
SystemParametersInfoA
IsIconic
GetWindowPlacement
SetActiveWindow
IsWindow
GetSystemMetrics
CreateDialogIndirectParamA
DestroyWindow
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
GetKeyState
CallNextHookEx
MessageBoxA
EnableWindow
wsprintfA
UnregisterClassA
HideCaret
ShowCaret
ExcludeUpdateRgn
ValidateRect
IsWindowVisible
PeekMessageA
SetWindowsHookExA
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
SetCursor
CharUpperA
ShowWindow
MoveWindow
IsDialogMessageA
SetDlgItemTextA
GetDlgItemTextA
PostQuitMessage
SetWindowTextA
DialogBoxParamA
GetDlgItem
EndDialog
LoadMenuA
GetCursorPos
GetSubMenu
TrackPopupMenu
LoadImageA
LoadIconA
DrawFocusRect
DefDlgProcA
CreateWindowExA
GetWindowRect
GetParent
PostMessageA
SendMessageA
KillTimer
SetTimer
IsWindowUnicode
CharNextA
DefWindowProcA
gdi32
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
IntersectClipRect
DeleteObject
SetViewportOrgEx
GetDeviceCaps
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
PatBlt
SetMapMode
SetBkMode
GetStockObject
SelectObject
RestoreDC
SaveDC
DeleteDC
GetObjectA
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
CreateDIBitmap
GetTextExtentPointA
BitBlt
CreateCompatibleDC
CreateSolidBrush
comdlg32
GetFileTitleA
GetSaveFileNameA
winspool.drv
ClosePrinter
OpenPrinterA
DocumentPropertiesA
advapi32
RegCreateKeyExA
RegOpenKeyExA
RegSetValueExA
RegCloseKey
shell32
ShellExecuteA
SHGetSpecialFolderPathA
ExtractIconA
ShellExecuteExA
comctl32
ord17
ImageList_Destroy
ImageList_Create
ImageList_ReplaceIcon
urlmon
URLOpenBlockingStreamA
shlwapi
PathStripPathA
netapi32
Netbios
Sections
.text Size: 132KB - Virtual size: 131KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 876KB - Virtual size: 872KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ