Static task
static1
Behavioral task
behavioral1
Sample
afa4a1056ab2bc5be83a7aa30b1b25fb4f7a6e3086ec4a8578ec754358eaf027.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
afa4a1056ab2bc5be83a7aa30b1b25fb4f7a6e3086ec4a8578ec754358eaf027.exe
Resource
win10v2004-20231215-en
General
-
Target
afa4a1056ab2bc5be83a7aa30b1b25fb4f7a6e3086ec4a8578ec754358eaf027
-
Size
234KB
-
MD5
cbd290c00f205a62bbb0ecfb0e98c336
-
SHA1
7b2507415e19a2a357fe1fd2cafa6fb9e67dc5d6
-
SHA256
afa4a1056ab2bc5be83a7aa30b1b25fb4f7a6e3086ec4a8578ec754358eaf027
-
SHA512
4891d541e2af6bf9c32e62bf67c8944ddb0beb12d6ddb35e5777d3bc97d2240437c87631edb0b890c6b90a7d0b79094d6f4f39bc4eaf860ccedac17faf0d32f1
-
SSDEEP
6144:zCuiSOqzAQs/RjcNKX3BjLpxaqAsVFuj9nMAsWuK:z9s/RQNo3h1fAsLhWD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource afa4a1056ab2bc5be83a7aa30b1b25fb4f7a6e3086ec4a8578ec754358eaf027
Files
-
afa4a1056ab2bc5be83a7aa30b1b25fb4f7a6e3086ec4a8578ec754358eaf027.exe windows:5 windows x86 arch:x86
4c2c228f1e5f2f7ab0ecffb4bf764581
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
HeapFree
RtlUnwind
Sleep
ExitProcess
RaiseException
HeapSize
HeapReAlloc
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
HeapCreate
VirtualFree
QueryPerformanceCounter
InitializeCriticalSectionAndSpinCount
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetConsoleCP
GetConsoleMode
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
GetProcessHeap
lstrlenA
GetCurrentProcess
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GlobalFindAtomW
LoadLibraryA
GetVersionExA
GetCurrentProcessId
GlobalAddAtomW
FormatMessageW
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalFree
LocalAlloc
GlobalFlags
GlobalFree
GlobalUnlock
GetModuleHandleA
WritePrivateProfileStringW
CloseHandle
GetLastError
SetLastError
SetErrorMode
lstrlenW
GlobalDeleteAtom
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
EnumResourceLanguagesW
GetModuleFileNameW
lstrcmpA
GetLocaleInfoW
LoadLibraryW
WideCharToMultiByte
MultiByteToWideChar
FindResourceW
LoadResource
LockResource
SizeofResource
InterlockedExchange
GlobalLock
lstrcmpW
GlobalAlloc
FreeLibrary
GetProcAddress
VirtualAlloc
GetConsoleWindow
GetModuleHandleW
GetCommandLineW
GetTickCount
InterlockedDecrement
GetSystemTimeAsFileTime
InterlockedIncrement
user32
DestroyMenu
LoadCursorW
GetSysColorBrush
RegisterWindowMessageW
LoadIconW
WinHelpW
GetCapture
GetClassLongW
SetPropW
GetPropW
RemovePropW
IsWindow
GetForegroundWindow
GetDlgItem
DestroyWindow
GetMessagePos
MapWindowPoints
SetMenu
SetForegroundWindow
GetClientRect
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
AdjustWindowRectEx
CopyRect
DefWindowProcW
CallWindowProcW
GetMenu
SetWindowLongW
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetSystemMetrics
GetWindowThreadProcessId
GetLastActivePopup
IsWindowEnabled
ShowWindow
PostQuitMessage
PostMessageW
ValidateRect
EnableWindow
MessageBoxW
GetMenuItemID
GetSubMenu
GetWindow
GetDlgCtrlID
GetWindowRect
GetWindowLongW
GetClassNameW
GetTopWindow
GetCursorPos
PeekMessageW
GetKeyState
SendMessageW
IsWindowVisible
GetActiveWindow
DispatchMessageW
TranslateMessage
GetMessageW
CallNextHookEx
SetWindowsHookExW
CheckMenuItem
EnableMenuItem
GetMenuState
ModifyMenuW
GetParent
GetFocus
LoadBitmapW
GetMenuCheckMarkDimensions
SetMenuItemBitmaps
SetCursor
PtInRect
GetWindowTextW
SetWindowTextW
GetSysColor
ReleaseDC
GetDC
ClientToScreen
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
UnhookWindowsHookEx
GetMenuItemCount
GetMessageTime
gdi32
GetStockObject
GetDeviceCaps
DeleteDC
ScaleViewportExtEx
ScaleWindowExtEx
SetWindowExtEx
CreateBitmap
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutW
TextOutW
RectVisible
PtVisible
DeleteObject
GetClipBox
SetMapMode
SetTextColor
SetBkColor
RestoreDC
SaveDC
winspool.drv
DocumentPropertiesW
OpenPrinterW
ClosePrinter
advapi32
RegQueryValueW
RegOpenKeyW
RegEnumKeyW
RegDeleteKeyW
RegSetValueExW
RegCreateKeyExW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
shlwapi
PathFindExtensionW
PathFindFileNameW
ole32
CoUninitialize
CoCreateInstance
CoInitialize
oleaut32
SysAllocString
SysFreeString
VariantInit
VariantClear
SafeArrayAccessData
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayUnaccessData
VariantChangeType
GetErrorInfo
Sections
.text Size: 155KB - Virtual size: 154KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 37KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ