Static task
static1
Behavioral task
behavioral1
Sample
56dca318cc18d5b18cff68cfda74b53c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
56dca318cc18d5b18cff68cfda74b53c.exe
Resource
win10v2004-20231215-en
General
-
Target
56dca318cc18d5b18cff68cfda74b53c
-
Size
628KB
-
MD5
56dca318cc18d5b18cff68cfda74b53c
-
SHA1
b5c6f304ce6587ded391d9124a72203a3e00bab3
-
SHA256
54a72e5636d7f8b038b5d2df452ce481349f826481ff4d38d09008d13c8187e4
-
SHA512
4ee071e7e3dfd44e77b3917a36eda7436ff505f73fa18ac3b920411895b16f5be4b4a0dedc1d49d8563ed1776f765ea7537ec5f6927f6a92bbbc75669f9e34ed
-
SSDEEP
12288:TvBXvwbjgx1bYpDuPMe0YWj+yyhIY+24FJ6GnfoKJ4:1X4bUxpm9h6JanFTf5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 56dca318cc18d5b18cff68cfda74b53c
Files
-
56dca318cc18d5b18cff68cfda74b53c.exe windows:4 windows x86 arch:x86
600606a319e7bb78c2c33be9bde9fc97
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
winmm
timeGetTime
kernel32
GetCommandLineA
GetProcessHeap
GetStartupInfoA
RaiseException
ExitProcess
HeapSize
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetACP
VirtualFree
HeapDestroy
HeapCreate
GetStdHandle
GetConsoleCP
GetConsoleMode
SetHandleCount
GetFileType
FreeEnvironmentStringsA
GetEnvironmentStrings
VirtualAlloc
GetEnvironmentStringsW
GetTickCount
GetSystemTimeAsFileTime
SetStdHandle
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
HeapReAlloc
HeapFree
HeapAlloc
RtlUnwind
SetErrorMode
SetEndOfFile
FlushFileBuffers
WritePrivateProfileStringA
GetThreadLocale
GetOEMCP
GetCPInfo
GlobalFlags
GetSystemDirectoryA
DeviceIoControl
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
InterlockedIncrement
GetCurrentProcessId
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
lstrcmpA
FreeResource
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcmpW
InterlockedDecrement
GetModuleFileNameW
SetLastError
GlobalLock
GlobalUnlock
FormatMessageA
LocalFree
MulDiv
QueryPerformanceCounter
QueryPerformanceFrequency
GetSystemInfo
GetProcessAffinityMask
SetFilePointer
ReadFile
DeleteFileA
GetComputerNameA
CreateMutexA
ReleaseMutex
GetCurrentProcess
GetModuleHandleA
GetModuleFileNameA
GetProcAddress
GlobalMemoryStatus
CreateFileA
WriteFile
CreateThread
SetThreadPriority
Sleep
ExitThread
WaitForSingleObject
CloseHandle
GlobalAlloc
GlobalReAlloc
GlobalFree
GlobalSize
lstrcmpiA
CompareStringA
GetVersion
GetLastError
MultiByteToWideChar
InterlockedExchange
GetWindowsDirectoryA
LoadLibraryA
FreeLibrary
lstrcatA
lstrlenA
WinExec
lstrcpyA
GetVersionExA
GetTempPathA
GetCurrentDirectoryA
SetCurrentDirectoryA
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
SizeofResource
FreeEnvironmentStringsW
user32
DestroyMenu
UnregisterClassA
GetSysColorBrush
GetWindowThreadProcessId
PostQuitMessage
GetMessageA
TranslateMessage
GetCursorPos
ValidateRect
MoveWindow
SetWindowTextA
IsDialogMessageA
SetDlgItemTextA
SetDlgItemInt
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetDesktopWindow
CreateDialogIndirectParamA
GetNextDlgTabItem
EndDialog
GetActiveWindow
ShowWindow
IsWindowEnabled
RegisterWindowMessageA
SendDlgItemMessageA
WinHelpA
CallNextHookEx
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
GetFocus
IsWindow
SetFocus
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
SetActiveWindow
DispatchMessageA
GetDlgItem
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
GetKeyState
SetForegroundWindow
IsWindowVisible
UpdateWindow
GetMenu
PostMessageA
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
GetParent
CopyRect
PtInRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
GetWindowLongA
SetWindowPos
SystemParametersInfoA
GetWindowPlacement
GetCapture
GetWindow
UnhookWindowsHookEx
EndPaint
BeginPaint
ClientToScreen
ScreenToClient
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
EmptyClipboard
SetClipboardData
CloseClipboard
GetDC
ReleaseDC
SetWindowLongA
LoadCursorA
CopyIcon
SetCursor
GetSysColor
LoadIconA
KillTimer
SetTimer
IsIconic
DrawIcon
OffsetRect
MessageBoxA
GetSystemMetrics
GetWindowDC
EnableWindow
OpenClipboard
GetClientRect
GetWindowRect
SendMessageA
LoadBitmapA
SetWindowsHookExA
gdi32
DeleteDC
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
DeleteObject
CreateBitmap
GetObjectA
GetClipBox
SetMapMode
SetTextColor
SetBkMode
SetBkColor
RestoreDC
SaveDC
GetSystemPaletteEntries
SelectPalette
RealizePalette
GetDIBits
GetDeviceCaps
CreatePalette
CreateFontIndirectA
GetStockObject
CreateFontA
GetTextExtentPoint32A
GetPixel
BitBlt
CreateCompatibleDC
CreateCompatibleBitmap
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
RevertToSelf
AccessCheck
IsValidSecurityDescriptor
SetSecurityDescriptorOwner
SetSecurityDescriptorGroup
SetSecurityDescriptorDacl
AddAccessAllowedAce
InitializeAcl
GetLengthSid
RegSetValueExA
RegCreateKeyExA
RegEnumKeyA
RegDeleteKeyA
RegQueryValueExA
RegOpenKeyA
OpenSCManagerA
ControlService
StartServiceA
OpenServiceA
DeleteService
CreateServiceA
CloseServiceHandle
RegOpenKeyExA
RegQueryValueA
RegCloseKey
InitializeSecurityDescriptor
FreeSid
AllocateAndInitializeSid
OpenProcessToken
OpenThreadToken
ImpersonateSelf
shell32
ShellExecuteA
shlwapi
PathFindFileNameA
PathFindExtensionA
ole32
CoCreateInstance
CoUninitialize
CoInitialize
oleaut32
VariantClear
VariantChangeType
VariantInit
SysStringLen
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
Sections
.text Size: 472KB - Virtual size: 468KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 104KB - Virtual size: 101KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 609KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ