Static task
static1
Behavioral task
behavioral1
Sample
045f161f8f54e52af3ff35b93c382ad1.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
045f161f8f54e52af3ff35b93c382ad1.exe
Resource
win10v2004-20231215-en
General
-
Target
045f161f8f54e52af3ff35b93c382ad1
-
Size
228KB
-
MD5
045f161f8f54e52af3ff35b93c382ad1
-
SHA1
7b207950725bf99d72987985194573d67616a214
-
SHA256
e1fdf41e84c01985ec13d294583c6a146172c00bc5482e422583107facc9d0e3
-
SHA512
939f3d0909db4cfdb8db9540f123ed6d2d3ef029c4e68c83c4994f0782614a181251484fdb1ecf45c3972343c82d0459a79695606358dfac54407b9ab96d6036
-
SSDEEP
3072:0L15CL5/bb8Qrr+J9Sd2XZRnEZxH/X9IWSzzyyUFEaEA7+oL75VYwi:8Q/bbHUSAXZBEZhlkyVKQLV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 045f161f8f54e52af3ff35b93c382ad1
Files
-
045f161f8f54e52af3ff35b93c382ad1.exe windows:4 windows x86 arch:x86
b0a0d8edf4d72b85d0b3ad9ed0f1f316
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
setupapi
SetupCloseInfFile
SetupFindFirstLineA
SetupFindNextLine
SetupGetStringFieldA
SetupOpenInfFileA
kernel32
GetTickCount
GetFullPathNameA
GetFileSize
GetVolumeInformationA
GetStartupInfoA
GetFileTime
RtlUnwind
TerminateProcess
HeapFree
UnlockFile
SetEndOfFile
GetTimeZoneInformation
GetCommandLineA
GetACP
HeapReAlloc
HeapSize
ExitProcess
RaiseException
SetFilePointer
HeapAlloc
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetEnvironmentVariableA
HeapDestroy
LocalAlloc
GetDriveTypeA
GetStringTypeA
GetStringTypeW
VirtualAlloc
LockFile
IsBadReadPtr
IsBadCodePtr
SetStdHandle
CompareStringA
CompareStringW
SetEnvironmentVariableA
FlushFileBuffers
CreateFileA
WriteFile
ReadFile
DuplicateHandle
SetErrorMode
GetOEMCP
GetThreadLocale
SizeofResource
GetCurrentDirectoryA
GetCPInfo
GetProcessVersion
WritePrivateProfileStringA
TlsGetValue
GlobalFlags
MulDiv
LCMapStringW
UnhandledExceptionFilter
GlobalReAlloc
InterlockedIncrement
GetVersionExA
GetSystemDirectoryA
GetShortPathNameA
MoveFileExA
Sleep
LoadLibraryA
GetProcAddress
FreeLibrary
GetWindowsDirectoryA
MultiByteToWideChar
GetVersion
SetFileAttributesA
DeleteFileA
GetCurrentProcess
GetLastError
CloseHandle
GetFileAttributesA
LocalReAlloc
TlsSetValue
TlsAlloc
TlsFree
GlobalHandle
HeapCreate
FileTimeToLocalFileTime
GetProfileStringA
FileTimeToSystemTime
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
GlobalUnlock
GlobalFree
FindResourceA
LoadResource
LockResource
lstrcatA
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GetModuleHandleA
GetModuleFileNameA
GlobalLock
GlobalAlloc
GlobalDeleteAtom
lstrcmpA
GetCurrentThread
GetCurrentThreadId
FormatMessageA
LocalFree
FindNextFileA
lstrcpyA
FindFirstFileA
SetLastError
FindClose
lstrcpynA
lstrcmpiA
WideCharToMultiByte
lstrlenA
InterlockedDecrement
VirtualFree
SetUnhandledExceptionFilter
LCMapStringA
IsBadWritePtr
user32
InvalidateRect
CharUpperA
InflateRect
RegisterClipboardFormatA
PostThreadMessageA
BeginPaint
GetWindowDC
ReleaseDC
GetDC
PtInRect
GetClassNameA
ClientToScreen
GetDesktopWindow
LoadCursorA
LoadStringA
MapDialogRect
SetWindowContextHelpId
EndDialog
CreateDialogIndirectParamA
LoadIconA
UpdateWindow
MapWindowPoints
GetSysColor
SetActiveWindow
AdjustWindowRectEx
ScreenToClient
GetClientRect
CopyRect
GetTopWindow
IsChild
GetCapture
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
DefWindowProcA
DestroyWindow
GetSysColorBrush
GetPropA
CallWindowProcA
RemovePropA
GetMessageTime
GetMessagePos
GetForegroundWindow
SetForegroundWindow
GetWindow
RegisterWindowMessageA
OffsetRect
IntersectRect
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetSystemMetrics
SetFocus
ShowWindow
SetWindowPos
MoveWindow
SetWindowLongA
GetDlgCtrlID
GetWindowTextLengthA
GetWindowTextA
SetWindowTextA
IsDialogMessageA
SendDlgItemMessageA
GetDlgItem
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetMessageA
TranslateMessage
DispatchMessageA
GetNextDlgGroupItem
MessageBeep
CharNextA
SetRect
CopyAcceleratorTableA
WinHelpA
wsprintfA
DestroyMenu
GetActiveWindow
GetKeyState
CallNextHookEx
ValidateRect
IsWindowVisible
PeekMessageA
GetCursorPos
SetWindowsHookExA
GetParent
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
EnableWindow
SetCursor
PostQuitMessage
FindWindowA
MessageBoxA
ExitWindowsEx
IsWindow
PostMessageA
SendMessageA
TabbedTextOutA
GrayStringA
DrawTextA
SetPropA
EndPaint
UnhookWindowsHookEx
GetClassLongA
CreateWindowExA
UnregisterClassA
HideCaret
ShowCaret
ExcludeUpdateRgn
DrawFocusRect
DefDlgProcA
IsWindowUnicode
gdi32
GetObjectA
SetBkColor
SetTextColor
GetClipBox
BitBlt
DeleteObject
CreateCompatibleDC
CreateDIBitmap
GetDeviceCaps
GetViewportExtEx
GetWindowExtEx
CreateSolidBrush
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
GetTextColor
GetBkColor
DPtoLP
LPtoDP
GetMapMode
PatBlt
ScaleWindowExtEx
SetWindowExtEx
SetViewportExtEx
OffsetViewportOrgEx
ScaleViewportExtEx
SetMapMode
SetViewportOrgEx
SetBkMode
GetStockObject
SelectObject
SaveDC
RestoreDC
GetTextExtentPointA
IntersectClipRect
DeleteDC
CreateBitmap
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegCloseKey
RegDeleteValueA
AdjustTokenPrivileges
RegSetValueExA
RegCreateKeyExA
LookupPrivilegeValueA
OpenProcessToken
RegDeleteKeyA
RegOpenKeyExA
comctl32
ord17
oledlg
ord8
ole32
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
OleInitialize
CoTaskMemFree
CoRevokeClassObject
CoInitialize
CoCreateInstance
CoFreeUnusedLibraries
CoUninitialize
CLSIDFromString
OleUninitialize
CLSIDFromProgID
CoRegisterMessageFilter
OleIsCurrentClipboard
OleFlushClipboard
CoTaskMemAlloc
olepro32
ord253
oleaut32
SysFreeString
VariantTimeToSystemTime
SysAllocStringByteLen
SysStringLen
SysAllocString
SysAllocStringLen
VariantChangeType
VariantClear
VariantCopy
Sections
.text Size: 148KB - Virtual size: 147KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.WYCao Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ