Static task
static1
Behavioral task
behavioral1
Sample
110449ca0891ca03dea6392fc92b4e09.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
110449ca0891ca03dea6392fc92b4e09.exe
Resource
win10v2004-20231222-en
General
-
Target
110449ca0891ca03dea6392fc92b4e09
-
Size
264KB
-
MD5
110449ca0891ca03dea6392fc92b4e09
-
SHA1
3676ebf0bb2bc9fe4c5cb1cbb4dcdc3381a33ec5
-
SHA256
5edcc01cc06e19ddc89d571530d38afa0a14e4d9b6fdf6eea707e2be0a9f8023
-
SHA512
1c20929d63ee8b7e70937df272390f2e2e1a0e182be4e52d381b6e40c4b7dd5db12cb619700e1581269fe5b99976dda298567d6d8509a2b2eed204945b255bfc
-
SSDEEP
6144:CgFWSvXaNmIf/fkZfqofFXbZIiG8BBzQ7xU:6/kxuiZBtUK
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 110449ca0891ca03dea6392fc92b4e09
Files
-
110449ca0891ca03dea6392fc92b4e09.exe windows:4 windows x86 arch:x86
0d38cbd89ac1324f9ee6514359cafb37
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
psapi
GetModuleBaseNameA
EnumProcesses
kernel32
GetCurrentProcess
FindClose
FindFirstFileA
GetVolumeInformationA
GetFullPathNameA
CreateFileA
InterlockedIncrement
TlsGetValue
GlobalReAlloc
GlobalHandle
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
GlobalFlags
GetCPInfo
GetOEMCP
GetFileTime
SetErrorMode
HeapFree
HeapAlloc
HeapReAlloc
VirtualAlloc
GetProcessHeap
GetStartupInfoA
RtlUnwind
RaiseException
ExitProcess
DuplicateHandle
CreateThread
HeapSize
SetStdHandle
GetFileType
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetACP
GetStringTypeA
GetStringTypeW
HeapDestroy
HeapCreate
VirtualFree
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetTimeZoneInformation
GetConsoleCP
GetConsoleMode
LCMapStringA
LCMapStringW
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
GetThreadLocale
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
LocalAlloc
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
FileTimeToLocalFileTime
FileTimeToSystemTime
GlobalGetAtomNameA
GlobalFindAtomA
lstrcmpW
GetVersionExA
InterlockedDecrement
GetModuleFileNameW
GetCurrentProcessId
GlobalAddAtomA
CreateEventA
SuspendThread
SetThreadPriority
WritePrivateProfileStringA
GetCurrentThread
ConvertDefaultLocale
GetModuleFileNameA
EnumResourceLanguagesA
GetLocaleInfoA
LoadLibraryA
lstrcmpA
FreeLibrary
GlobalDeleteAtom
GetModuleHandleA
GetProcAddress
SetLastError
GlobalFree
FormatMessageA
LocalFree
SetEvent
ResumeThread
ResetEvent
WriteConsoleA
SetConsoleTextAttribute
GetTickCount
GetCurrentThreadId
GetLocalTime
CreateSemaphoreW
GetCommandLineA
GetVersion
CompareStringA
GetLastError
InterlockedExchange
MultiByteToWideChar
CompareStringW
GlobalUnlock
GlobalLock
GlobalAlloc
MulDiv
FreeResource
lstrlenA
OpenProcess
GetFileAttributesA
Sleep
GetExitCodeThread
WaitForSingleObject
CreateProcessA
CopyFileA
DeleteFileA
CreateDirectoryA
SetCurrentDirectoryA
CloseHandle
CreateSemaphoreA
ReleaseSemaphore
OpenSemaphoreA
FindResourceA
LoadResource
LockResource
SizeofResource
WideCharToMultiByte
ExitThread
user32
LoadCursorA
GetSysColorBrush
EndPaint
BeginPaint
ReleaseDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
RegisterWindowMessageA
WinHelpA
GetCapture
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
GetForegroundWindow
GetTopWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
UpdateWindow
GetMenu
CreateWindowExA
GetClassInfoExA
RegisterClassA
GetSysColor
AdjustWindowRectEx
CopyRect
PtInRect
DefWindowProcA
CallWindowProcA
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
GetWindowTextA
SetWindowPos
SetFocus
ShowWindow
SetWindowLongA
GetDlgCtrlID
SetWindowTextA
IsDialogMessageA
SendDlgItemMessageA
GetWindow
UnhookWindowsHookEx
GetWindowThreadProcessId
GetLastActivePopup
MessageBoxA
SetCursor
SetWindowsHookExA
CallNextHookEx
TranslateMessage
IsWindowVisible
GetKeyState
PeekMessageA
GetCursorPos
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
GetFocus
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetDesktopWindow
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
IsWindow
GetWindowLongA
DestroyMenu
UnregisterClassA
GetClassInfoA
GetDlgItem
IsWindowEnabled
GetParent
GetNextDlgTabItem
EndDialog
PostQuitMessage
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
DispatchMessageA
GetMessageA
CharUpperA
LoadBitmapA
MessageBoxExA
EnableWindow
PostThreadMessageA
SendMessageA
GetDC
DrawIcon
GetClientRect
GetSystemMetrics
IsIconic
PostMessageA
LoadIconA
gdi32
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
GetStockObject
PtVisible
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
GetObjectA
GetDeviceCaps
DeleteObject
SetMapMode
RestoreDC
SaveDC
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
RectVisible
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegQueryValueA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyExA
RegOpenKeyA
RegSetValueExA
RegCloseKey
RegQueryValueExA
RegCreateKeyExA
shell32
SHGetSpecialFolderPathA
shlwapi
PathFindFileNameA
PathStripToRootA
PathFindExtensionA
PathIsUNCA
ole32
CreateStreamOnHGlobal
oleaut32
OleLoadPicture
VariantClear
VariantChangeType
VariantInit
urlmon
IsValidURL
URLDownloadToCacheFileA
URLDownloadToFileA
Sections
.text Size: 160KB - Virtual size: 158KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 48KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ