Static task
static1
Behavioral task
behavioral1
Sample
047fa0745ea5cc8ec52b7da37f5f31cc.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
047fa0745ea5cc8ec52b7da37f5f31cc.exe
Resource
win10v2004-20231215-en
General
-
Target
047fa0745ea5cc8ec52b7da37f5f31cc
-
Size
304KB
-
MD5
047fa0745ea5cc8ec52b7da37f5f31cc
-
SHA1
ddebca0f6f1bc745ad40d814207ac3ecd21e0790
-
SHA256
e37813872dea5d05fb4a3702623a5955835fa117338828968ebbdad4970b4006
-
SHA512
652c7b030adb12024b5ce7ec6e479a527fc9504db93065ce75352fa0fd49de8d936cb1007166fe6bd41040ecf890895ecfa283277a80332d3467064603eec8dd
-
SSDEEP
6144:+R/4X3LhjJYgKvKxDMhqs2GfpjVbudqiIux625eaL:+2X7tJOC1MYs2GfHbtiIux625X
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 047fa0745ea5cc8ec52b7da37f5f31cc
Files
-
047fa0745ea5cc8ec52b7da37f5f31cc.exe windows:4 windows x86 arch:x86
337252a94a426d0e0c370ea3e19f0567
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileType
LCMapStringA
LCMapStringW
QueryPerformanceCounter
HeapDestroy
HeapCreate
VirtualFree
GetStringTypeA
GetStringTypeW
SetUnhandledExceptionFilter
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
SetStdHandle
GetEnvironmentStringsW
SetHandleCount
GetTimeZoneInformation
IsBadCodePtr
SetEnvironmentVariableA
HeapSize
GetCommandLineA
GetStartupInfoA
GetSystemTimeAsFileTime
HeapReAlloc
VirtualQuery
GetSystemInfo
VirtualAlloc
VirtualProtect
ExitProcess
RtlUnwind
GetFileTime
SetErrorMode
GetOEMCP
GetCPInfo
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
GlobalHandle
GlobalReAlloc
GlobalFlags
LocalAlloc
FileTimeToLocalFileTime
GetFullPathNameA
GetVolumeInformationA
GetCurrentProcess
DuplicateHandle
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
GlobalGetAtomNameA
GlobalFindAtomA
lstrcatA
lstrcmpW
SetLastError
MulDiv
FormatMessageA
LocalFree
GlobalUnlock
FreeResource
GlobalFree
WaitForSingleObject
GlobalAddAtomA
GetCurrentThread
GlobalLock
GlobalAlloc
GlobalDeleteAtom
lstrcmpA
ConvertDefaultLocale
EnumResourceLanguagesA
lstrcpyA
GetTickCount
UnmapViewOfFile
FileTimeToSystemTime
IsBadReadPtr
IsBadWritePtr
SetFileTime
GetCurrentDirectoryA
LocalFileTimeToFileTime
SystemTimeToFileTime
ReadFile
CompareStringW
CompareStringA
GetVersion
GetCurrentThreadId
CreateThread
GetCurrentProcessId
FindFirstFileA
GetFileAttributesA
RemoveDirectoryA
FindNextFileA
FindClose
GetSystemDirectoryA
WritePrivateProfileStringA
CreateDirectoryA
CreateFileA
GetFileSize
SetFilePointer
WriteFile
GetPrivateProfileStringA
SetFileAttributesA
DeleteFileA
MoveFileExA
OpenProcess
TerminateProcess
IsDBCSLeadByte
lstrcpynA
lstrcmpiA
LoadLibraryExA
EnterCriticalSection
LeaveCriticalSection
GetModuleFileNameA
lstrlenA
MultiByteToWideChar
lstrlenW
CreateToolhelp32Snapshot
Process32First
Process32Next
CloseHandle
InterlockedDecrement
InterlockedIncrement
WideCharToMultiByte
GetLastError
GetProcessHeap
HeapAlloc
GetModuleHandleA
HeapFree
LoadLibraryA
GetProcAddress
FreeLibrary
FindResourceA
LoadResource
LockResource
SizeofResource
DeleteCriticalSection
InitializeCriticalSection
RaiseException
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
FreeEnvironmentStringsW
InterlockedExchange
user32
GetForegroundWindow
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
LoadIconA
MapWindowPoints
SetForegroundWindow
UpdateWindow
GetMenu
GetSysColor
AdjustWindowRectEx
EqualRect
GetClassInfoA
RegisterClassA
DefWindowProcA
CallWindowProcA
IntersectRect
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetMenuItemID
GetMenuItemCount
GetSubMenu
OffsetRect
PtInRect
CopyRect
SetActiveWindow
GetSystemMetrics
CreateDialogIndirectParamA
DestroyWindow
GetNextDlgTabItem
EndDialog
SetWindowContextHelpId
MapDialogRect
GetWindowTextA
SetWindowPos
SetFocus
ShowWindow
TabbedTextOutA
SetWindowLongA
GetDlgCtrlID
GetPropA
IsChild
GetClassNameA
GetClassInfoExA
DrawTextA
DrawTextExA
GrayStringA
GetDC
ReleaseDC
GetWindowDC
BeginPaint
EndPaint
GetSysColorBrush
SetWindowTextA
IsDialogMessageA
SendDlgItemMessageA
GetDlgItem
SetMenuItemBitmaps
GetFocus
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
LoadBitmapA
SetWindowsHookExA
CallNextHookEx
TranslateMessage
GetActiveWindow
IsWindowVisible
GetKeyState
PeekMessageA
GetCursorPos
ValidateRect
GetParent
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
SendMessageA
SetCursor
PostQuitMessage
PostMessageA
wsprintfA
CharUpperA
GetMessageA
DispatchMessageA
PostThreadMessageA
LoadStringA
GetClassLongA
CreateWindowExA
GetCapture
WinHelpA
RegisterWindowMessageA
ClientToScreen
SetCapture
MessageBoxA
RemovePropA
SetPropA
EnableWindow
CharNextA
UnregisterClassA
KillTimer
SetTimer
GetClientRect
GetDesktopWindow
GetWindow
IsWindow
LoadCursorA
ReleaseCapture
IsRectEmpty
RegisterClipboardFormatA
SetRect
DestroyMenu
MessageBeep
GetNextDlgGroupItem
InvalidateRgn
InvalidateRect
MoveWindow
CopyAcceleratorTableA
gdi32
DeleteDC
CreateRectRgnIndirect
GetRgnBox
ExtSelectClipRgn
GetMapMode
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetWindowExtEx
GetViewportExtEx
SetMapMode
RestoreDC
SaveDC
DeleteObject
SetBkColor
SetTextColor
GetClipBox
GetTextColor
GetBkColor
GetDeviceCaps
CreateBitmap
GetStockObject
GetObjectA
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
CloseServiceHandle
SetSecurityDescriptorDacl
AddAccessAllowedAce
AddAce
EqualSid
GetAce
InitializeAcl
GetLengthSid
GetAclInformation
GetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegQueryValueA
RegOpenKeyA
RegEnumKeyA
StartServiceCtrlDispatcherA
RegisterServiceCtrlHandlerA
SetServiceStatus
RegisterEventSourceA
ReportEventA
DeregisterEventSource
ControlService
DeleteService
CreateServiceA
OpenSCManagerA
OpenServiceA
SetFileSecurityA
RegQueryValueExA
RegSetValueExA
RegEnumKeyExA
RegQueryInfoKeyA
RegOpenKeyExA
RegCloseKey
RegDeleteValueA
RegCreateKeyExA
RegDeleteKeyA
LookupAccountNameA
GetFileSecurityA
shell32
SHGetSpecialFolderPathA
ShellExecuteA
comctl32
ord17
shlwapi
PathFindExtensionA
PathFindFileNameA
UrlUnescapeA
PathStripToRootA
PathIsUNCA
oledlg
ord8
ole32
OleFlushClipboard
CoCreateInstance
CoTaskMemFree
CoTaskMemAlloc
CoTaskMemRealloc
CLSIDFromProgID
CLSIDFromString
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CoRevokeClassObject
CoRegisterMessageFilter
OleIsCurrentClipboard
oleaut32
SysFreeString
SysAllocStringLen
OleCreateFontIndirect
VariantClear
VariantChangeType
VariantInit
SysStringLen
SysAllocStringByteLen
SystemTimeToVariantTime
SafeArrayDestroy
SysAllocString
VariantCopy
VarUI4FromStr
ws2_32
inet_ntoa
gethostbyname
inet_addr
htons
connect
socket
recv
send
setsockopt
shutdown
closesocket
WSAStartup
WSAGetLastError
WSACleanup
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
psapi
EnumProcessModules
GetModuleFileNameExA
wininet
FindNextUrlCacheEntryA
InternetCanonicalizeUrlA
InternetCrackUrlA
FindFirstUrlCacheEntryA
DeleteUrlCacheEntry
netapi32
Netbios
Sections
.text Size: 208KB - Virtual size: 206KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 60KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ