Static task
static1
Behavioral task
behavioral1
Sample
49d0fbf57b093bec66e5c19f3751bdea.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
49d0fbf57b093bec66e5c19f3751bdea.exe
Resource
win10v2004-20231215-en
General
-
Target
49d0fbf57b093bec66e5c19f3751bdea
-
Size
4.9MB
-
MD5
49d0fbf57b093bec66e5c19f3751bdea
-
SHA1
c9e09a14ca675264f71dc332c1095867f312cc1d
-
SHA256
5418e023452701c6e571c23ff3fb2bf08517c4ffe71ca58df11705570d038159
-
SHA512
770e1a916310525ec8651aa354c7262a141e3753e82a7cb5fc4f1c0df11953ad2e9bf18f2eb9065acec13e22d4952b67dbf2b03291d4ecb3dc7d1cf7fc63a035
-
SSDEEP
98304:QhCv4iKa4CuXji98ZH8KiBCrrfYOTzQg+WfvA2x1:b4CuX2VCrrAYQg+9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 49d0fbf57b093bec66e5c19f3751bdea
Files
-
49d0fbf57b093bec66e5c19f3751bdea.exe windows:5 windows x86 arch:x86
e1a755d0bdc7d6938f37b8b3fb66acf3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdiplus
GdipCloneImage
GdipDeleteGraphics
GdipCreateFont
GdipGetGenericFontFamilySansSerif
GdipDeleteFontFamily
GdiplusStartup
GdipDrawImageRectRect
GdipSetImageAttributesColorKeys
GdipDisposeImageAttributes
GdipCreateImageAttributes
GdipDrawImageRect
GdipGetImageDimension
GdipCreateBitmapFromStreamICM
GdipCreateFromHDC
GdipDisposeImage
GdipDrawString
GdipCloneBrush
GdipAlloc
GdipFree
GdipDeleteBrush
GdipCreateSolidFill
GdipDeleteFont
GdipCreateFontFamilyFromName
kernel32
AttachConsole
GetStdHandle
GetConsoleScreenBufferInfo
FillConsoleOutputCharacterW
FillConsoleOutputAttribute
SetConsoleCursorPosition
WriteConsoleW
GetTickCount
MulDiv
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
FindResourceW
LoadResource
SizeofResource
LockResource
SetLastError
WriteFile
SetFilePointer
MapViewOfFile
GetFileSize
UnmapViewOfFile
_llseek
QueryPerformanceCounter
_lclose
InitializeCriticalSection
FormatMessageW
LeaveCriticalSection
CreateFileW
EnterCriticalSection
GetLocalTime
QueryPerformanceFrequency
GetCurrentThreadId
LocalFree
SearchPathW
ExpandEnvironmentStringsW
FindFirstFileW
InterlockedIncrement
InterlockedDecrement
CreateDirectoryW
LoadLibraryW
CopyFileW
FlushFileBuffers
FindClose
RemoveDirectoryW
GetModuleHandleA
FindNextFileW
DeleteCriticalSection
DeleteFileW
SetFileAttributesW
FreeLibrary
WaitForSingleObject
SetEvent
ConnectNamedPipe
CreateNamedPipeW
SetEnvironmentVariableW
Sleep
CreateEventA
DisconnectNamedPipe
ResetEvent
LoadLibraryA
CreateEventW
SetNamedPipeHandleState
WaitForMultipleObjects
GetWindowsDirectoryW
GetCurrentProcess
GetCurrentThread
DuplicateHandle
CreateFileMappingW
OpenFileMappingW
CreateMutexW
InterlockedCompareExchange
WaitForSingleObjectEx
ReleaseMutex
WideCharToMultiByte
GetFileAttributesW
GetEnvironmentVariableW
SetEndOfFile
GetShortPathNameW
GetCurrentDirectoryW
ReadFile
HeapSize
GetFileAttributesExW
GetVersionExA
GetFileSizeEx
GetEnvironmentStringsW
FindFirstFileExW
FreeEnvironmentStringsW
LoadLibraryExW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
GetLocaleInfoW
GetFileType
InitializeCriticalSectionAndSpinCount
SetHandleCount
GetConsoleMode
GetConsoleCP
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
LCMapStringW
RtlUnwind
RaiseException
HeapReAlloc
GetTimeZoneInformation
GetStartupInfoW
HeapSetInformation
GetCommandLineW
HeapAlloc
HeapFree
GetCPInfo
GetProcAddress
GetModuleHandleW
GetSystemTimeAsFileTime
CloseHandle
GetLastError
CreateThread
ResumeThread
TerminateProcess
GetCurrentProcessId
CreateProcessW
ExitProcess
GetFullPathNameW
GetModuleFileNameW
EnumSystemLocalesA
IsValidLocale
SetStdHandle
GetProcessHeap
CompareStringW
SetEnvironmentVariableA
VirtualQuery
VirtualProtect
VirtualAlloc
FlushInstructionCache
GetThreadContext
SetThreadContext
SuspendThread
ReadProcessMemory
VirtualQueryEx
VirtualAllocEx
WriteProcessMemory
VirtualProtectEx
HeapCreate
IsProcessorFeaturePresent
WaitNamedPipeW
MoveFileW
lstrlenA
DecodePointer
EncodePointer
GetStringTypeW
MultiByteToWideChar
InterlockedExchange
GetLocaleInfoA
GetUserDefaultLCID
IsValidCodePage
GetOEMCP
GetACP
user32
KillTimer
PeekMessageW
DefWindowProcW
CreateWindowExW
GetDesktopWindow
GetWindowRect
RegisterClassExW
DrawTextW
wsprintfW
InvalidateRect
ShowWindow
UpdateWindow
IsWindow
DestroyWindow
DispatchMessageW
TranslateMessage
GetMessageW
SetTimer
MessageBoxW
BeginPaint
EndPaint
LoadCursorW
SetLayeredWindowAttributes
gdi32
SetDCPenColor
SetDCBrushColor
GetStockObject
SetBkMode
SetTextColor
DeleteObject
GetTextExtentPoint32W
SelectObject
CreateFontIndirectW
GetDeviceCaps
Rectangle
advapi32
RegEnumValueW
EnumServicesStatusExW
QueryServiceConfigW
ControlService
GetServiceDisplayNameW
QueryServiceStatusEx
SetServiceStatus
ChangeServiceConfigW
QueryServiceStatus
StartServiceW
ChangeServiceConfig2W
QueryServiceConfig2W
OpenServiceW
EnumDependentServicesW
OpenSCManagerW
DeleteService
CloseServiceHandle
LookupAccountSidW
GetTokenInformation
OpenProcessToken
RegOpenKeyExW
RegQueryValueExW
RegOpenKeyW
RegCloseKey
RegSetValueExW
RegCreateKeyExW
RegEnumKeyExW
shell32
SHGetSpecialFolderLocation
SHGetMalloc
SHCreateDirectoryExW
SHChangeNotify
SHBindToParent
SHGetFolderPathW
ole32
CreateStreamOnHGlobal
CoInitialize
OleRun
CoCreateInstance
oleaut32
SysAllocString
VariantClear
SysFreeString
GetErrorInfo
shlwapi
StrRetToBufW
Sections
.text Size: 1.9MB - Virtual size: 1.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 329KB - Virtual size: 328KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2.5MB - Virtual size: 2.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 183KB - Virtual size: 182KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ