Static task
static1
Behavioral task
behavioral1
Sample
742029eaaaa6953547058bdd970ac1eafea48711c955eb0bd4256e8db238db97.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
742029eaaaa6953547058bdd970ac1eafea48711c955eb0bd4256e8db238db97.exe
Resource
win10v2004-20231215-en
General
-
Target
742029eaaaa6953547058bdd970ac1eafea48711c955eb0bd4256e8db238db97
-
Size
1.1MB
-
MD5
80c9ed98b573c032b8b076c57911161e
-
SHA1
9a86624915fcf9446965af7f3e132ec6594aadda
-
SHA256
742029eaaaa6953547058bdd970ac1eafea48711c955eb0bd4256e8db238db97
-
SHA512
0d5fc076ae8044008f56e934998f56b460ab2a05a721862b0706debdfe9a04132153de8f339e87aea84c4ecee3a903da3ad3fab8e6ff4febe2822ae9b970e93f
-
SSDEEP
12288:ExhKnDct9s7d5mozb9fWNGA30hngGE+d3QCN6QZqH:NNU8ngG5d3j9qH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 742029eaaaa6953547058bdd970ac1eafea48711c955eb0bd4256e8db238db97
Files
-
742029eaaaa6953547058bdd970ac1eafea48711c955eb0bd4256e8db238db97.exe windows:4 windows x86 arch:x86
f262d9ca418d81c289cb5d91217bd288
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
AdjustTokenPrivileges
GetUserNameW
ImpersonateLoggedOnUser
LookupPrivilegeValueW
OpenProcessToken
RegCloseKey
RegCreateKeyExW
RegOpenKeyExW
RegQueryValueExW
RegSetValueExW
RevertToSelf
comctl32
InitCommonControls
CreateStatusWindowW
ImageList_Create
ImageList_Remove
ImageList_ReplaceIcon
gdi32
BitBlt
CreateCompatibleBitmap
CreateCompatibleDC
CreatePen
CreateSolidBrush
DeleteDC
DeleteObject
ExcludeClipRect
ExtTextOutW
LineTo
MoveToEx
RestoreDC
SaveDC
SelectObject
SetBkColor
SetPixel
SetTextColor
kernel32
CloseHandle
CreateEventW
CreateProcessW
CreateThread
EnterCriticalSection
FormatMessageW
GetCommandLineA
GetModuleHandleA
GetModuleHandleW
GetPriorityClass
GetProcAddress
GetProcessAffinityMask
GetProcessIoCounters
GetStartupInfoA
GetSystemInfo
GetVersionExW
HeapAlloc
HeapFree
InitializeCriticalSection
IsWow64Process
LeaveCriticalSection
LocalFree
MultiByteToWideChar
OpenProcess
ReadProcessMemory
ResetEvent
SetEvent
SetPriorityClass
SetProcessAffinityMask
TerminateProcess
WaitForSingleObject
WriteProcessMemory
lstrcmpW
ntdll
NtQueryInformationProcess
NtQuerySystemInformation
shell32
ShellAboutW
Shell_NotifyIconW
shlwapi
StrFormatByteSizeW
StrFormatKBSizeW
ucrtbase
__acrt_iob_func
__p___argc
__p___argv
__stdio_common_vfprintf
__stdio_common_vswprintf
_configure_narrow_argv
_get_initial_narrow_environment
_initialize_narrow_environment
_set_app_type
_ui64tow
exit
log10
memcpy
strcmp
toupper
wcscat
wcsstr
user32
AppendMenuW
BeginPaint
BringWindowToTop
CallWindowProcW
CascadeWindows
CheckMenuItem
CheckMenuRadioItem
CopyRect
CreateDialogParamW
CreateIconIndirect
CreatePopupMenu
DefWindowProcW
DeleteMenu
DestroyIcon
DestroyMenu
DialogBoxParamW
DrawMenuBar
DrawTextW
EnableMenuItem
EnableWindow
EndDialog
EndPaint
EnumWindows
FillRect
GetClassLongW
GetClientRect
GetCursorPos
GetDC
GetDlgItem
GetGuiResources
GetMenu
GetMenuItemCount
GetMenuState
GetParent
GetSubMenu
GetSysColor
GetSystemMetrics
GetWindow
GetWindowLongW
GetWindowPlacement
GetWindowRect
GetWindowTextW
GetWindowThreadProcessId
InsertMenuW
InvalidateRect
IsHungAppWindow
IsIconic
IsWindow
IsWindowVisible
IsZoomed
KillTimer
LoadBitmapW
LoadIconW
LoadImageA
LoadImageW
LoadMenuW
LoadStringA
LoadStringW
MapWindowPoints
MessageBoxW
MoveWindow
OpenIcon
PostMessageW
ReleaseDC
RemoveMenu
SendMessageA
SendMessageTimeoutW
SendMessageW
SetFocus
SetForegroundWindow
SetMenuDefaultItem
SetTimer
SetWindowLongW
SetWindowPos
SetWindowTextW
ShowWindow
SwitchToThisWindow
TileWindows
TrackPopupMenu
TrackPopupMenuEx
WinHelpW
wsprintfW
Sections
.text Size: 64KB - Virtual size: 62KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 144B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
/4 Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 18KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 612KB - Virtual size: 608KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
/14 Size: 4KB - Virtual size: 672B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/29 Size: 172KB - Virtual size: 171KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/41 Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/55 Size: 40KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/67 Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/78 Size: 44KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/89 Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ