Static task
static1
Behavioral task
behavioral1
Sample
347f1e8a8d7a6c3549ad492f7d4de3c0.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
347f1e8a8d7a6c3549ad492f7d4de3c0.exe
Resource
win10v2004-20231020-en
General
-
Target
347f1e8a8d7a6c3549ad492f7d4de3c0.exe
-
Size
208KB
-
MD5
347f1e8a8d7a6c3549ad492f7d4de3c0
-
SHA1
ab4e6be084b40f87dd835f1aa29b05487e788f9c
-
SHA256
ac7e2681d27a1b499d85dca12719fad6a5e7f0535eb66338a1486bb02df7fcc1
-
SHA512
b03401c0a2fec5b5d50367811b4a94c0375408bf4916e7ede7c8d90dd384439132a0f988f1cbc89c84b8d88559e9dadbb94508e91ba453c0be74f5f987d53081
-
SSDEEP
3072:gpxXxev6EVp/F058mWBq43WymHc2HxEq5rrhoiD8Q:0xheXXN0aL3Wy2rsQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 347f1e8a8d7a6c3549ad492f7d4de3c0.exe
Files
-
347f1e8a8d7a6c3549ad492f7d4de3c0.exe.exe windows:4 windows x86 arch:x86
de4009ff24225bbdc53940e0c1bfbd25
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileAttributesA
GetFileSize
GetFileTime
FileTimeToSystemTime
FileTimeToLocalFileTime
lstrcatA
TlsAlloc
GlobalFree
GlobalUnlock
GlobalHandle
GlobalLock
GlobalReAlloc
GlobalAlloc
TlsSetValue
LocalReAlloc
TlsGetValue
GetVersion
lstrcmpA
GetCurrentThreadId
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetProcessVersion
GlobalFlags
GetCPInfo
GetOEMCP
RtlUnwind
ExitProcess
GetTimeZoneInformation
GetSystemTime
RaiseException
SetStdHandle
GetACP
HeapSize
HeapReAlloc
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
SetHandleCount
GetStdHandle
GetStartupInfoA
LCMapStringA
LCMapStringW
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
GetDriveTypeA
IsBadReadPtr
IsBadCodePtr
CompareStringA
CompareStringW
SetEnvironmentVariableA
InterlockedExchange
SetLastError
lstrcmpiA
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
UnlockFile
LockFile
FlushFileBuffers
FormatMessageA
LocalAlloc
lstrcpynA
lstrlenA
InterlockedDecrement
InterlockedIncrement
MultiByteToWideChar
ReleaseMutex
LocalFree
lstrcpyA
CreateMutexA
FreeLibrary
GetModuleHandleA
LoadLibraryA
GetProcAddress
GetVersionExA
OutputDebugStringA
WriteFile
SetFileTime
CreateDirectoryA
DosDateTimeToFileTime
GetCurrentDirectoryA
SystemTimeToFileTime
ReadFile
DuplicateHandle
GetFileType
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
GetPrivateProfileStringA
WritePrivateProfileStringA
UnmapViewOfFile
SetFilePointer
SetEndOfFile
CreateFileA
CreateFileMappingA
MapViewOfFile
SetEvent
GetCurrentProcess
WideCharToMultiByte
TerminateProcess
GetLastError
CreateEventA
PostQueuedCompletionStatus
InterlockedExchangeAdd
GetQueuedCompletionStatus
HeapAlloc
TerminateThread
CreateThread
GetProcessHeap
HeapFree
GetSystemInfo
DeleteFileA
CreateIoCompletionPort
GetTickCount
GetCurrentProcessId
GetModuleFileNameA
Sleep
CreateProcessA
SetThreadAffinityMask
ResumeThread
CloseHandle
WaitForSingleObject
ExpandEnvironmentStringsA
GetTempPathA
SetFileAttributesA
GetCommandLineA
GetLocalTime
user32
PostMessageA
LoadIconA
SetWindowTextA
LoadCursorA
GetSysColorBrush
ReleaseDC
GetDC
GetClassNameA
PtInRect
ClientToScreen
PostQuitMessage
DestroyMenu
TabbedTextOutA
DrawTextA
GrayStringA
GetSysColor
SetFocus
AdjustWindowRectEx
GetClientRect
CopyRect
GetTopWindow
GetCapture
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetDlgItem
GetWindowTextA
GetDlgCtrlID
DestroyWindow
CreateWindowExA
GetClassLongA
SetPropA
GetPropA
CallWindowProcA
RemovePropA
DefWindowProcA
GetMessageTime
GetMessagePos
GetForegroundWindow
SetForegroundWindow
GetWindow
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
WinHelpA
DispatchMessageA
GetKeyState
CallNextHookEx
PeekMessageA
SetWindowsHookExA
GetParent
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
SendMessageA
MessageBoxA
EnableWindow
UnhookWindowsHookEx
LoadStringA
GetSystemMetrics
CharUpperA
MapWindowPoints
gdi32
SetWindowExtEx
ScaleWindowExtEx
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
GetStockObject
SelectObject
RestoreDC
SaveDC
DeleteDC
DeleteObject
GetDeviceCaps
GetObjectA
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
AllocateAndInitializeSid
InitializeSecurityDescriptor
GetLengthSid
InitializeAcl
AddAccessAllowedAce
SetSecurityDescriptorDacl
FreeSid
comctl32
ord17
ws2_32
WSAAddressToStringA
sendto
__WSAFDIsSet
recvfrom
gethostbyaddr
gethostname
recv
send
accept
ioctlsocket
connect
select
gethostbyname
inet_ntoa
socket
WSAEventSelect
WSAIoctl
htons
bind
listen
closesocket
WSASend
getpeername
ntohs
WSARecv
WSASocketA
setsockopt
WSAGetLastError
inet_addr
htonl
ntohl
WSACleanup
WSAStartup
wininet
InternetCloseHandle
InternetQueryOptionA
InternetCanonicalizeUrlA
InternetGetLastResponseInfoA
HttpQueryInfoA
InternetQueryDataAvailable
InternetReadFile
InternetWriteFile
InternetSetFilePointer
InternetSetStatusCallback
InternetSetOptionExA
InternetOpenUrlA
InternetCrackUrlA
InternetOpenA
iphlpapi
GetBestInterface
GetIpAddrTable
ole32
CoCreateGuid
Sections
.text Size: 140KB - Virtual size: 136KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 28KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
LPClient Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE