Static task
static1
Behavioral task
behavioral1
Sample
043cb1838ed5a4b613ac1882edfbbfd5.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
043cb1838ed5a4b613ac1882edfbbfd5.exe
Resource
win10v2004-20231215-en
General
-
Target
043cb1838ed5a4b613ac1882edfbbfd5
-
Size
23KB
-
MD5
043cb1838ed5a4b613ac1882edfbbfd5
-
SHA1
02e98e4f9b64fb302e66c647ccecf21e0790e3fd
-
SHA256
7bff89b77f888e3fde5e6976f5f95058ac07e705dc496905f6075b91604fb63c
-
SHA512
14a6e76e8c8bcc39410e42b014f85257a7b40ce999073f9fe3a12f5442b6dd7ee6d6b7caf0abc427fe6ba1f18e405ea04cc115ee5dfb3be2698b02b4d695160d
-
SSDEEP
384:ntxI6iI6GjwP3qgI5GgDvoqbrj5lFZrb93tcgRv+nUumh55CgT22wjEJweV9:nE6T6G0vUGLev55b9Zve05bT29jE
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 043cb1838ed5a4b613ac1882edfbbfd5
Files
-
043cb1838ed5a4b613ac1882edfbbfd5.exe windows:5 windows x86 arch:x86
b03eec6228fc4f96cfc890cf8bdc1d13
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
KillTimer
SetCursor
ShowWindow
TranslateMessage
GetClientRect
ScreenToClient
GetKeyboardLayout
DestroyWindow
DispatchMessageW
LoadCursorW
GetDlgCtrlID
EndDialog
SendMessageW
CharUpperW
GetDlgItemTextW
EnableWindow
GetMenuState
DestroyMenu
DialogBoxParamW
wsprintfW
DrawTextExW
TranslateAcceleratorW
ChildWindowFromPoint
GetDesktopWindow
SendDlgItemMessageW
CharLowerW
LoadIconW
SetScrollPos
GetWindow
GetWindowTextW
CloseClipboard
GetMessageA
PeekMessageW
CreateDialogParamW
CallWindowProcA
IsDlgButtonChecked
SetWinEventHook
IsClipboardFormatAvailable
SendDlgItemMessageA
LoadStringW
IsIconic
SetPropW
SetFocus
GetFocus
GetForegroundWindow
PostMessageA
GetMenu
GetWindowLongW
MoveWindow
DeleteMenu
DestroyIcon
PostMessageW
SetDlgItemTextW
GetWindowPlacement
UnhookWinEvent
SetWindowPos
LoadImageW
SetWindowLongW
GetParent
SetWindowLongA
SetActiveWindow
ReleaseDC
IsChild
OpenClipboard
GetSubMenu
RegisterWindowMessageW
MessageBoxW
CharNextW
GetKeyState
InvalidateRect
SendMessageA
CreateWindowExW
RegisterClassExW
MessageBeep
GetDlgItem
PostQuitMessage
GetCursorPos
SetWindowTextW
IsDialogMessageW
GetSysColor
CallWindowProcW
GetSystemMetrics
CheckMenuItem
SetWindowPlacement
WinHelpW
CreatePopupMenu
DefWindowProcW
GetMessageW
LoadAcceleratorsW
GetDC
EnableMenuItem
UpdateWindow
GetWindowRect
GetSystemMenu
gdi32
SetBkMode
CreateFontIndirectW
GetStockObject
GetTextExtentPoint32W
StartDocW
GetTextFaceW
AbortDoc
DeleteDC
GetDeviceCaps
CreateDCW
StartPage
SetViewportExtEx
EnumFontsW
SetMapMode
LPtoDP
DeleteObject
GetTextMetricsW
GetObjectW
TextOutW
SetAbortProc
EndPage
SetWindowExtEx
EndDoc
SelectObject
kernel32
GetLastError
CreateFileW
lstrcatW
InitializeCriticalSection
GlobalLock
FindClose
SystemTimeToFileTime
GetStringTypeA
WaitForSingleObject
FreeEnvironmentStringsW
SetUnhandledExceptionFilter
VirtualAlloc
SizeofResource
LoadLibraryA
MultiByteToWideChar
WaitForMultipleObjects
GetDateFormatA
CreateMutexW
CreateProcessW
GetCommandLineW
ExitProcess
LocalAlloc
LocalUnlock
lstrcpynW
GetSystemTimeAsFileTime
LocalLock
GetDateFormatW
MapViewOfFile
UnmapViewOfFile
GetOEMCP
SearchPathW
GetStdHandle
WriteConsoleA
InterlockedDecrement
IsDBCSLeadByte
HeapSize
TlsFree
FindFirstFileW
GetACP
GetSystemTime
LocalSize
TerminateProcess
GetCurrentDirectoryA
GetTickCount
GetCurrentProcess
InterlockedExchange
GetStringTypeW
GlobalUnlock
IsDebuggerPresent
GetFileSize
WriteFile
SetEndOfFile
lstrcatA
GetProcessHeap
lstrcmpiW
SetFileAttributesA
CreateFileMappingW
GlobalSize
GetVersionExA
GetFileType
InterlockedIncrement
HeapAlloc
DeviceIoControl
LeaveCriticalSection
InterlockedCompareExchange
Sleep
GetCurrentThreadId
CloseHandle
GetLocaleInfoW
GetTimeFormatW
GetStartupInfoA
EnterCriticalSection
GlobalFree
LocalReAlloc
GetCurrentProcessId
VirtualProtect
TlsSetValue
GetFileAttributesW
GetUserDefaultLCID
CreateThread
DeleteCriticalSection
GetUserDefaultUILanguage
DeleteFileW
IsBadCodePtr
UnhandledExceptionFilter
GetCommandLineA
CompareStringW
IsProcessorFeaturePresent
MulDiv
FreeResource
ExpandEnvironmentStringsW
GetModuleHandleA
WideCharToMultiByte
lstrcmpW
QueryPerformanceCounter
FoldStringW
GetFileInformationByHandle
GetLocaleInfoA
FormatMessageW
GetLocalTime
LocalFree
lstrlenW
GetProcAddress
VirtualFree
ReadFile
FreeLibrary
CreateEventW
IsValidCodePage
GetExitCodeProcess
GetShortPathNameA
DisableThreadLibraryCalls
SetLastError
HeapFree
lstrcpyW
GetStartupInfoW
CreateDirectoryW
comdlg32
FindTextW
PageSetupDlgW
ChooseFontW
GetFileTitleW
CommDlgExtendedError
ReplaceTextW
GetOpenFileNameW
PrintDlgExW
GetSaveFileNameW
msvcrt
_snwprintf
_wcsicmp
??_U@YAPAXI@Z
_c_exit
iswctype
_callnewh
wcsncmp
strchr
exit
__set_app_type
_exit
malloc
localtime
_unlock
_cexit
time
_wtol
__setusermatherr
wcsncpy
memset
__p__fmode
_adjust_fdiv
memmove
_initterm
_XcptFilter
_controlfp
wcschr
__p__commode
_acmdln
__getmainargs
shell32
DragAcceptFiles
ShellAboutW
DragQueryFileW
DragFinish
comctl32
CreateStatusWindowW
advapi32
IsTextUnicode
RegCloseKey
RegCreateKeyW
RegQueryValueExW
RegSetValueExW
RegOpenKeyExA
RegQueryValueExA
winspool.drv
GetPrinterDriverW
OpenPrinterW
ClosePrinter
Sections
.text Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 74KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 250B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ