Static task
static1
Behavioral task
behavioral1
Sample
367acb1b29d9cc130d465305286b2ab6f52f6ae7cecd047a71575413232d2d64.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
367acb1b29d9cc130d465305286b2ab6f52f6ae7cecd047a71575413232d2d64.exe
Resource
win10v2004-20231215-en
General
-
Target
367acb1b29d9cc130d465305286b2ab6f52f6ae7cecd047a71575413232d2d64
-
Size
2.0MB
-
MD5
96385403365f075c4820bddec007090e
-
SHA1
5371431e4d0f9fa633df40a50767ecdc5dd212ae
-
SHA256
367acb1b29d9cc130d465305286b2ab6f52f6ae7cecd047a71575413232d2d64
-
SHA512
e8997c6225ec6f9abbc6a2ca4779a2354f3cad3eb5ba0074a67ecf912e2bc50e3878fe4b31b98b8ee8f04fae315b56f0665ee47a9431fe276bfe6906698588c7
-
SSDEEP
24576:mctuLwuhHZ8are71CIx4RfPvy7Egq2DSBRS1SSmS6ShzSVSFSCS8TyAAHcnCYVQm:mctpcJ6xjx4NZVq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 367acb1b29d9cc130d465305286b2ab6f52f6ae7cecd047a71575413232d2d64
Files
-
367acb1b29d9cc130d465305286b2ab6f52f6ae7cecd047a71575413232d2d64.exe windows:4 windows x86 arch:x86
4d45d8eec036dad20fec53dac35a5868
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualAlloc
IsBadWritePtr
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
SetUnhandledExceptionFilter
SetStdHandle
CompareStringA
CompareStringW
SetEnvironmentVariableA
VirtualFree
GetProfileStringA
HeapCreate
HeapDestroy
GetVersionExA
GetEnvironmentVariableA
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
LCMapStringW
LCMapStringA
HeapReAlloc
HeapSize
TerminateProcess
GetACP
GetSystemTime
GetTimeZoneInformation
HeapFree
HeapAlloc
RaiseException
ExitProcess
GetCommandLineA
GetStartupInfoA
RtlUnwind
GetTickCount
SetErrorMode
SystemTimeToFileTime
LocalFileTimeToFileTime
GetFileSize
GetCurrentDirectoryA
SizeofResource
GetOEMCP
GetCPInfo
GetProcessVersion
GlobalFlags
TlsGetValue
LocalReAlloc
TlsSetValue
GlobalReAlloc
TlsFree
GlobalHandle
TlsAlloc
LocalAlloc
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
GetShortPathNameA
GetStringTypeExA
GetVolumeInformationA
FindFirstFileA
FindClose
DeleteFileA
MoveFileA
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
CreateFileA
GetCurrentProcess
DuplicateHandle
GetThreadLocale
GetDiskFreeSpaceA
GetFileTime
SetFileTime
GetFullPathNameA
GetTempFileNameA
GetFileAttributesA
CloseHandle
GlobalAlloc
GetCurrentThread
lstrcmpA
GetLastError
FormatMessageA
LocalFree
FileTimeToLocalFileTime
FileTimeToSystemTime
lstrcpynA
MulDiv
SetLastError
GlobalLock
GlobalUnlock
GlobalFree
FreeLibrary
FindResourceA
LoadResource
LockResource
GetVersion
lstrcatA
GetCurrentThreadId
GlobalGetAtomNameA
lstrcmpiA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
GetModuleHandleA
LoadLibraryA
GetProcAddress
MultiByteToWideChar
WideCharToMultiByte
lstrlenA
InterlockedDecrement
InterlockedIncrement
CreateDirectoryA
GetLocalTime
WritePrivateProfileStringA
GetModuleFileNameA
lstrcpyA
GetPrivateProfileStringA
GetWindowsDirectoryA
GetPrivateProfileIntA
user32
SetCursor
ReleaseCapture
TranslateAcceleratorA
LoadAcceleratorsA
SetRectEmpty
GrayStringA
DrawTextA
TabbedTextOutA
EndPaint
BeginPaint
GetWindowDC
wvsprintfA
GetDC
ReleaseDC
EndDialog
GetActiveWindow
CreateDialogIndirectParamA
GetMenuCheckMarkDimensions
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetNextDlgTabItem
IsWindowEnabled
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
SetDlgItemTextA
PostMessageA
SendDlgItemMessageA
MapWindowPoints
PeekMessageA
DispatchMessageA
GetFocus
SetActiveWindow
IsWindow
SetFocus
AdjustWindowRectEx
EqualRect
DeferWindowPos
BeginDeferWindowPos
EndDeferWindowPos
IsWindowVisible
ScrollWindow
DestroyMenu
SetScrollInfo
ShowScrollBar
GetScrollRange
GetScrollPos
GetTopWindow
MessageBoxA
IsChild
ReuseDDElParam
WinHelpA
wsprintfA
GetClassInfoA
RegisterClassA
InvertRect
GetMenuItemCount
GetMenuItemID
TrackPopupMenu
GetDlgItem
GetWindowTextLengthA
GetWindowTextA
GetDlgCtrlID
GetKeyState
DestroyWindow
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
SetPropA
UnhookWindowsHookEx
GetPropA
CallWindowProcA
RemovePropA
DefWindowProcA
GetMessageTime
GetMessagePos
GetLastActivePopup
GetForegroundWindow
SetForegroundWindow
GetWindow
GetWindowLongA
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
OffsetRect
IntersectRect
SystemParametersInfoA
EnableWindow
UnregisterClassA
HideCaret
ShowCaret
ExcludeUpdateRgn
DefDlgProcA
IsWindowUnicode
SendMessageA
GetScrollInfo
SetMenu
IsIconic
GetWindowPlacement
GetSystemMetrics
LoadCursorA
LoadMenuA
GetSubMenu
ClientToScreen
LoadIconA
GetCursorPos
ScreenToClient
KillTimer
SetTimer
GetParent
UnpackDDElParam
PostThreadMessageA
RegisterClipboardFormatA
LockWindowUpdate
GetCapture
GetDCEx
GetClientRect
SetScrollRange
SetScrollPos
UpdateWindow
LoadBitmapA
GetSysColor
CopyRect
FillRect
DrawFocusRect
InvalidateRect
GetWindowRect
WindowFromPoint
GetTabbedTextExtentA
MessageBeep
GetNextDlgGroupItem
CopyAcceleratorTableA
DestroyIcon
GetMenuStringA
InsertMenuA
FindWindowA
GetSysColorBrush
GetClassNameA
LoadStringA
CharUpperA
GetSystemMenu
DeleteMenu
AppendMenuA
IsRectEmpty
SetParent
CharNextA
IsZoomed
SetRect
MapDialogRect
SetWindowContextHelpId
GetMessageA
TranslateMessage
ValidateRect
ShowOwnedPopups
PostQuitMessage
DestroyCursor
SetCursorPos
PtInRect
SetCapture
RedrawWindow
InflateRect
GetMenu
BringWindowToTop
GetDesktopWindow
gdi32
SetBkMode
SetPolyFillMode
SetROP2
SetStretchBltMode
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowOrgEx
SetWindowExtEx
ScaleWindowExtEx
SelectClipRgn
ExcludeClipRect
IntersectClipRect
MoveToEx
LineTo
SetTextAlign
GetCurrentPositionEx
DeleteObject
CreateRectRgn
GetViewportExtEx
GetWindowExtEx
CreatePatternBrush
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
DPtoLP
GetViewportOrgEx
AbortDoc
EndDoc
EndPage
StartPage
SetAbortProc
CreateDCA
StretchDIBits
GetCharWidthA
GetMapMode
SetRectRgn
CombineRgn
CreateFontIndirectA
GetTextExtentPoint32A
GetTextColor
GetBkColor
LPtoDP
GetNearestColor
GetStretchBltMode
GetPolyFillMode
GetTextAlign
GetBkMode
GetROP2
GetTextFaceA
GetWindowOrgEx
GetStockObject
RestoreDC
SaveDC
StartDocA
DeleteDC
CreateRectRgnIndirect
PatBlt
CreateBitmap
SetBkColor
SetTextColor
GetClipBox
SetPixelV
GetTextMetricsA
CreateCompatibleDC
CreateCompatibleBitmap
GetObjectA
GetDeviceCaps
CreatePen
StretchBlt
BitBlt
SelectObject
CreateSolidBrush
CreateFontA
CreateDIBitmap
GetTextExtentPointA
Rectangle
comdlg32
GetOpenFileNameA
PrintDlgA
GetFileTitleA
CommDlgExtendedError
GetSaveFileNameA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegCreateKeyA
RegQueryValueExA
RegOpenKeyExA
RegQueryValueA
RegEnumKeyA
RegOpenKeyA
RegDeleteKeyA
RegCreateKeyExA
RegSetValueExA
RegDeleteValueA
RegSetValueA
RegCloseKey
GetFileSecurityA
SetFileSecurityA
shell32
SHGetFileInfoA
DragQueryFileA
DragFinish
SHGetSpecialFolderPathA
ExtractIconA
comctl32
ImageList_ReplaceIcon
ord17
ImageList_Destroy
ImageList_Create
oledlg
ord8
ole32
CoTaskMemAlloc
CoTaskMemFree
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CLSIDFromString
CLSIDFromProgID
OleInitialize
OleUninitialize
CoFreeUnusedLibraries
CoRegisterMessageFilter
CoRevokeClassObject
OleFlushClipboard
OleIsCurrentClipboard
olepro32
ord253
oleaut32
VariantClear
SysFreeString
SysAllocStringLen
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayGetDim
SafeArrayCreate
SafeArrayRedim
VariantCopy
SysAllocString
SysAllocStringByteLen
VariantChangeType
VariantTimeToSystemTime
SysStringLen
shlwapi
PathIsDirectoryA
Sections
.text Size: 364KB - Virtual size: 362KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 84KB - Virtual size: 81KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.5MB - Virtual size: 1.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ