Static task
static1
Behavioral task
behavioral1
Sample
471478bd85c2ccd689d84270bc45b768f6fde9965aab8de639b33a173aa16deb.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
471478bd85c2ccd689d84270bc45b768f6fde9965aab8de639b33a173aa16deb.exe
Resource
win10v2004-20231020-en
General
-
Target
471478bd85c2ccd689d84270bc45b768f6fde9965aab8de639b33a173aa16deb
-
Size
860KB
-
MD5
92834ab83e86dae27d258aabe35cb145
-
SHA1
8426032d79ee5249851ace4cc293bb220c9534a1
-
SHA256
471478bd85c2ccd689d84270bc45b768f6fde9965aab8de639b33a173aa16deb
-
SHA512
31a4e4ac2c8840525a1d39baa10989ecfa3a8c2c078435709258af1763b4d5308655bc67b64aca9542b551901b3c1356b28a9b9cd8e725ee87f573448d299b63
-
SSDEEP
24576:BYaIAz/BlNDTxreDbxIFPIlPPPPPPPPPPPPPP:tJ/dfxy5IFPIlPPPPPPPPPPPPPP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 471478bd85c2ccd689d84270bc45b768f6fde9965aab8de639b33a173aa16deb
Files
-
471478bd85c2ccd689d84270bc45b768f6fde9965aab8de639b33a173aa16deb.exe windows:4 windows x86 arch:x86
08475b1aa068dba47b3c9ea2af2b8c60
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
TerminateProcess
HeapAlloc
GetStartupInfoA
GetCommandLineA
GetTimeZoneInformation
GetSystemTime
HeapFree
RaiseException
SetStdHandle
GetFileType
HeapReAlloc
HeapSize
GetACP
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
RtlUnwind
GetStdHandle
LCMapStringA
LCMapStringW
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
CompareStringA
CompareStringW
SetEnvironmentVariableA
FileTimeToLocalFileTime
FileTimeToSystemTime
SetErrorMode
PeekNamedPipe
GetFileInformationByHandle
GetProfileStringA
LoadLibraryExA
InterlockedCompareExchange
InterlockedExchange
GetFileTime
GetFileSize
GetFileAttributesA
GetOEMCP
GetCPInfo
GetProcessVersion
WritePrivateProfileStringA
GlobalFlags
TlsGetValue
LocalReAlloc
TlsSetValue
GlobalReAlloc
TlsFree
GlobalHandle
DeleteCriticalSection
TlsAlloc
LocalAlloc
MulDiv
SetLastError
GetFullPathNameA
lstrcpynA
GetVolumeInformationA
FindFirstFileA
FindClose
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GetCurrentProcess
DuplicateHandle
LocalFree
LoadLibraryA
FreeLibrary
GetVersion
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GetProcAddress
GlobalUnlock
GlobalFree
MultiByteToWideChar
WideCharToMultiByte
lstrlenA
InterlockedDecrement
InterlockedIncrement
CloseHandle
GetModuleFileNameA
GlobalLock
GlobalAlloc
GlobalDeleteAtom
lstrcmpiA
GetCurrentThread
GetCurrentThreadId
CreateFileA
GetComputerNameA
GetTempPathA
GetTempFileNameA
MoveFileA
Sleep
EnterCriticalSection
LeaveCriticalSection
lstrcmpA
InitializeCriticalSection
CreateThread
FindResourceA
SizeofResource
LoadResource
LockResource
TerminateThread
WaitForMultipleObjects
ResumeThread
SuspendThread
GetLocalTime
GetModuleHandleA
lstrcpyA
lstrcatA
CreateEventA
GetLastError
SetHandleCount
user32
GetDC
ReleaseDC
GetWindowDC
BeginPaint
EndPaint
TabbedTextOutA
DrawTextA
GrayStringA
LoadCursorA
GetClassNameA
PtInRect
GetSysColorBrush
LoadStringA
DestroyMenu
InflateRect
InvalidateRect
UpdateWindow
SendDlgItemMessageA
MapWindowPoints
GetSysColor
SetFocus
AdjustWindowRectEx
ScreenToClient
GetClientRect
CopyRect
GetTopWindow
GetCapture
WinHelpA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetMenuItemID
GetWindowTextLengthA
GetWindowTextA
GetDlgCtrlID
ClientToScreen
GetClassLongA
SetPropA
UnhookWindowsHookEx
GetPropA
CallWindowProcA
RemovePropA
GetMessageTime
GetMessagePos
GetForegroundWindow
SetForegroundWindow
GetWindow
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
OffsetRect
IntersectRect
SystemParametersInfoA
IsIconic
GetWindowPlacement
SetActiveWindow
IsWindow
GetSystemMetrics
CreateDialogIndirectParamA
DestroyWindow
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
GetKeyState
CallNextHookEx
MessageBoxA
EnableWindow
wsprintfA
UnregisterClassA
HideCaret
ShowCaret
ExcludeUpdateRgn
ValidateRect
IsWindowVisible
PeekMessageA
SetWindowsHookExA
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
SetCursor
CharUpperA
ShowWindow
MoveWindow
IsDialogMessageA
SetDlgItemTextA
GetDlgItemTextA
PostQuitMessage
SetWindowTextA
DialogBoxParamA
GetDlgItem
EndDialog
LoadMenuA
GetCursorPos
GetSubMenu
TrackPopupMenu
LoadImageA
LoadIconA
DrawFocusRect
DefDlgProcA
CreateWindowExA
GetWindowRect
GetParent
PostMessageA
SendMessageA
KillTimer
SetTimer
IsWindowUnicode
CharNextA
DefWindowProcA
gdi32
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
IntersectClipRect
DeleteObject
SetViewportOrgEx
GetDeviceCaps
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
PatBlt
SetMapMode
SetBkMode
GetStockObject
SelectObject
RestoreDC
SaveDC
DeleteDC
GetObjectA
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
CreateDIBitmap
GetTextExtentPointA
BitBlt
CreateCompatibleDC
CreateSolidBrush
comdlg32
GetFileTitleA
GetSaveFileNameA
winspool.drv
ClosePrinter
OpenPrinterA
DocumentPropertiesA
advapi32
RegCreateKeyExA
RegOpenKeyExA
RegSetValueExA
RegCloseKey
shell32
ShellExecuteA
SHGetSpecialFolderPathA
ExtractIconA
ShellExecuteExA
comctl32
ord17
ImageList_Destroy
ImageList_Create
ImageList_ReplaceIcon
urlmon
URLOpenBlockingStreamA
shlwapi
PathStripPathA
netapi32
Netbios
Sections
.text Size: 132KB - Virtual size: 131KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 688KB - Virtual size: 685KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ