Static task
static1
Behavioral task
behavioral1
Sample
4cfcdf211bc8545c8db30387b152bc765444a5f03347b0f6e8b6c0d73fc7ccf7.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4cfcdf211bc8545c8db30387b152bc765444a5f03347b0f6e8b6c0d73fc7ccf7.exe
Resource
win10v2004-20231215-en
General
-
Target
4cfcdf211bc8545c8db30387b152bc765444a5f03347b0f6e8b6c0d73fc7ccf7
-
Size
1.6MB
-
MD5
7c728da34ec45d3fc2084ccb60ef7583
-
SHA1
0db6c365f905186afb029da729c2d406c1eae0b2
-
SHA256
4cfcdf211bc8545c8db30387b152bc765444a5f03347b0f6e8b6c0d73fc7ccf7
-
SHA512
a7ad340a28a4bb64926e6f8317da205102ebd83ba9ab66178750ef801142cf3bd52e3237603b45e36212f645b7c8ed50ce22ad117c5e28b95afdb5aa08fdaca9
-
SSDEEP
24576:acEfhfzjcH9Knwfa8Gpc+D0kvfcBzcbVhzNAT0AHPfZdiIjjyHFniIjjyHFu:XEfO8D8oD04cBzcb/ZAhHPfZd7j27j
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4cfcdf211bc8545c8db30387b152bc765444a5f03347b0f6e8b6c0d73fc7ccf7
Files
-
4cfcdf211bc8545c8db30387b152bc765444a5f03347b0f6e8b6c0d73fc7ccf7.exe windows:6 windows x86 arch:x86
be504fcbf84b1e45813656d764bab11a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
IsBadReadPtr
GetModuleHandleW
GetCurrentProcessId
GetCurrentThreadId
SetUnhandledExceptionFilter
GetStartupInfoW
lstrlenW
lstrcpynW
GetProcessId
GetVersionExW
Sleep
OutputDebugStringW
GetCurrentThread
CreateProcessW
WideCharToMultiByte
ReleaseMutex
WaitForSingleObject
VirtualProtect
GetModuleFileNameW
AddAtomW
WritePrivateProfileStringW
lstrcmpiW
FreeLibrary
GetProcAddress
LoadLibraryW
GetProcessHeap
DeleteCriticalSection
HeapDestroy
DecodePointer
HeapAlloc
FindResourceW
LoadResource
FindResourceExW
RaiseException
CloseHandle
HeapReAlloc
LockResource
GetLastError
FindAtomW
DeleteFileW
FindClose
DeleteAtom
FindNextFileW
FindFirstFileW
CopyFileW
TerminateThread
GetProcessTimes
GetTickCount
SystemTimeToFileTime
Process32FirstW
Process32NextW
GetPrivateProfileStringW
CreateToolhelp32Snapshot
OpenProcess
ConnectNamedPipe
GetOverlappedResult
DisconnectNamedPipe
CreateFileW
WaitForMultipleObjects
CreateNamedPipeW
WriteFile
SetNamedPipeHandleState
ReadFile
ResetEvent
SetEvent
WriteConsoleW
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindFirstFileExW
ReadConsoleW
SetStdHandle
GetPrivateProfileIntW
CreateEventW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetStdHandle
MultiByteToWideChar
HeapSize
InitializeCriticalSectionEx
CreateMutexW
InitializeCriticalSection
LeaveCriticalSection
TerminateProcess
GetCurrentProcess
EnterCriticalSection
HeapFree
SizeofResource
IsDebuggerPresent
GetStringTypeW
WaitForSingleObjectEx
SwitchToThread
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
EncodePointer
QueryPerformanceCounter
QueryPerformanceFrequency
CompareStringW
LCMapStringW
GetLocaleInfoW
GetCPInfo
lstrcpyW
MulDiv
GetACP
ExitProcess
FreeResource
GetFileSize
lstrcmpW
SetEndOfFile
SetFilePointer
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
GetVersion
GlobalAlloc
GlobalUnlock
GlobalLock
GlobalFree
GetTempFileNameW
GetTempPathW
ResumeThread
GetLocalTime
IsProcessorFeaturePresent
UnhandledExceptionFilter
InitializeSListHead
LocalFree
GetSystemWindowsDirectoryW
LoadLibraryExW
DeviceIoControl
lstrcmpA
FlushFileBuffers
CreateThread
GetThreadTimes
FreeLibraryAndExitThread
RtlUnwind
GetFileAttributesExW
GetTimeZoneInformation
GetConsoleOutputCP
GetConsoleMode
GetFileType
SetFilePointerEx
ExitThread
GetModuleHandleExW
user32
SetCaretPos
ScreenToClient
MapWindowPoints
IntersectRect
UnionRect
IsRectEmpty
SetWindowLongW
GetParent
GetClassNameW
MonitorFromWindow
DefWindowProcW
CallWindowProcW
RegisterClassW
RegisterClassExW
GetClassInfoExW
ShowWindow
EnableWindow
SetPropW
GetPropW
InvalidateRect
LoadImageW
wvsprintfW
SetCursor
InflateRect
OffsetRect
IsIconic
SetWindowRgn
MessageBoxW
CharPrevW
DrawTextW
SetRect
DestroyIcon
DrawIconEx
GetIconInfo
GetCaretBlinkTime
GetDlgCtrlID
DrawFocusRect
FillRect
HideCaret
ShowCaret
ClientToScreen
GetSysColor
GetWindowDC
SetWindowTextW
GetWindowTextW
GetWindowTextLengthW
CreateAcceleratorTableW
InvalidateRgn
RemovePropW
FindWindowExW
IsWindowEnabled
CreateCaret
GetUpdateRect
EndPaint
BeginPaint
ReleaseDC
GetDC
KillTimer
ReleaseCapture
SetCapture
GetKeyState
GetFocus
CharNextW
IsZoomed
IsWindowVisible
UpdateLayeredWindow
DestroyWindow
IsChild
FindWindowW
IsWindow
CreateWindowExW
SendMessageW
DispatchMessageW
TranslateMessage
GetMessageW
GetMessagePos
GetClientRect
LoadCursorW
SendMessageTimeoutW
RegisterWindowMessageW
PostMessageW
SetTimer
LoadIconW
wsprintfW
GetWindow
GetWindowLongW
GetWindowRect
SetWindowPos
GetMonitorInfoW
PtInRect
MoveWindow
SetFocus
GetCursorPos
advapi32
RegEnumKeyExW
RegCreateKeyExW
RegCreateKeyW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
QueryServiceStatus
EqualSid
CloseServiceHandle
OpenSCManagerW
AllocateAndInitializeSid
OpenProcessToken
FreeSid
OpenServiceW
OpenThreadToken
GetTokenInformation
RegCloseKey
RegSetValueExW
RegOpenKeyExW
RegQueryValueExW
shell32
SHGetSpecialFolderPathW
Shell_NotifyIconW
SHCreateDirectoryExW
SHFileOperationW
ShellExecuteExW
ord165
ord680
ole32
CLSIDFromProgID
CLSIDFromString
CoCreateGuid
CreateStreamOnHGlobal
CoCreateInstance
OleLockRunning
CoInitialize
oleaut32
SafeArrayPutElement
VariantInit
SysFreeString
SysAllocString
SysAllocStringLen
VariantClear
SafeArrayCreate
SysStringLen
shlwapi
PathFindFileNameW
StrCmpNIW
StrTrimA
StrStrIA
SHAutoComplete
PathCombineW
StrStrIW
PathRemoveFileSpecW
PathAppendW
PathFileExistsW
wnsprintfW
StrCpyW
StrCmpIW
version
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
wininet
InternetGetConnectedState
iphlpapi
GetAdaptersInfo
urlmon
URLDownloadToCacheFileW
URLDownloadToFileW
msimg32
AlphaBlend
GradientFill
comctl32
ord17
_TrackMouseEvent
ImageList_DrawEx
ImageList_GetIconSize
InitCommonControlsEx
gdi32
GetClipBox
BitBlt
CreateCompatibleBitmap
CreateCompatibleDC
CreateFontIndirectW
CreatePen
DeleteDC
DeleteObject
GetStockObject
Rectangle
RestoreDC
SaveDC
SelectObject
GetTextMetricsW
GetObjectW
SetWindowOrgEx
GetDeviceCaps
CreateRoundRectRgn
CombineRgn
CreateRectRgnIndirect
GetCharABCWidthsW
CreateDCW
GetTextExtentPoint32W
SelectClipRgn
ExtSelectClipRgn
SetBkColor
SetBkMode
StretchBlt
SetStretchBltMode
SetDIBitsToDevice
SetTextColor
CreateDIBSection
SetDIBColorTable
TextOutW
ExtTextOutW
CreateSolidBrush
GetTextColor
GetDIBits
gdiplus
GdipAddPathArc
GdipDrawEllipseI
GdipLoadImageFromFile
GdipGetImagePixelFormat
GdipImageGetFrameDimensionsList
GdipDrawImageRectI
GdipGetPropertyItemSize
GdipImageSelectActiveFrame
GdipImageGetFrameDimensionsCount
GdipLoadImageFromStreamICM
GdipImageGetFrameCount
GdipGetPropertyItem
GdipAlloc
GdipFree
GdipCreatePath
GdipDeletePath
GdipAddPathLineI
GdipAddPathArcI
GdipCloneBrush
GdipDeleteBrush
GdipCreateSolidFill
GdipCreatePen1
GdipDeletePen
GdipSetPenMode
GdipSetPenDashStyle
GdipCreateFromHDC
GdipDeleteGraphics
GdipSetSmoothingMode
GdipDrawLineI
GdipDrawRectangleI
GdipDrawPath
GdipFillEllipseI
GdipClosePathFigure
GdipCreateTexture
GdipCloneImage
GdipDisposeImage
GdipSaveImageToFile
GdipGetImageGraphicsContext
GdipGetImageWidth
GdipGetImageHeight
GdipCreateBitmapFromStream
GdipCreateBitmapFromFile
GdipCreateBitmapFromScan0
GdipCreateHBITMAPFromBitmap
GdipCloneBitmapAreaI
GdipBitmapLockBits
GdipBitmapUnlockBits
GdipSetInterpolationMode
GdipGraphicsClear
GdipFillPath
GdipDrawImagePointsI
GdipDrawImageRectRectI
GdipGetImageEncodersSize
GdipGetImageEncoders
Sections
.text Size: 952KB - Virtual size: 951KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 219KB - Virtual size: 219KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 18KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 363KB - Virtual size: 362KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 58KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ