Static task
static1
Behavioral task
behavioral1
Sample
71d0169beaaf366521b8f929cde2b45b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
71d0169beaaf366521b8f929cde2b45b.exe
Resource
win10v2004-20231222-en
General
-
Target
71d0169beaaf366521b8f929cde2b45b
-
Size
268KB
-
MD5
71d0169beaaf366521b8f929cde2b45b
-
SHA1
eb397485a323abe97ee2660d996081f27fb56035
-
SHA256
e32133fa626b0e9b9fad97341863bfb37c7173066dac286f94adbd880ffd7a32
-
SHA512
afae2c8cc1449add35d6b0191bac055c7b744617262968a9265d97d4e7ad29fcf1f3b56dbdea93c1ace95fdab6a6558c4d0b56e3cd74bcd2fe3591c049822761
-
SSDEEP
6144:weBURNcEl30PJyIoIbEkY/ziPBShEmel:5El30PJ1Y/ziPBCEm
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 71d0169beaaf366521b8f929cde2b45b
Files
-
71d0169beaaf366521b8f929cde2b45b.exe windows:4 windows x86 arch:x86
4cd5959c59cf13d0c36cc57ef0c63f7e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapReAlloc
SetStdHandle
GetFileType
HeapSize
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
RaiseException
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
VirtualProtect
GetSystemInfo
VirtualQuery
GetLocaleInfoW
CreateThread
ExitThread
GetCommandLineA
GetStartupInfoA
TerminateProcess
HeapFree
HeapAlloc
RtlUnwind
ExitProcess
SetErrorMode
CreateFileA
SetEndOfFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GetOEMCP
GetCPInfo
InterlockedIncrement
GlobalFlags
InterlockedDecrement
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
TlsGetValue
EnterCriticalSection
GlobalHandle
GlobalReAlloc
LeaveCriticalSection
WritePrivateProfileStringA
WaitForSingleObject
ResumeThread
CloseHandle
GlobalAlloc
lstrcmpA
GetModuleFileNameA
ConvertDefaultLocale
EnumResourceLanguagesA
GlobalFree
GlobalLock
GlobalUnlock
MulDiv
lstrcpynA
FreeResource
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcatA
lstrcmpW
lstrcpyA
FreeLibrary
CopyFileExA
CreateDirectoryA
CreateProcessA
GetExitCodeProcess
GetSystemDirectoryA
GetWindowsDirectoryA
GetTempPathA
LocalAlloc
GetCurrentProcess
GetCurrentThread
GetLastError
FormatMessageA
LocalFree
SetLastError
GetUserDefaultLangID
CopyFileA
FindResourceA
LockResource
SizeofResource
RemoveDirectoryA
FindFirstFileA
DeleteFileA
FindNextFileA
FindClose
GetCurrentDirectoryA
GetShortPathNameA
GetFileAttributesA
SetFileAttributesA
SetCurrentDirectoryA
FindResourceExA
LoadResource
Sleep
lstrlenA
lstrcmpiA
GetVersion
WideCharToMultiByte
MultiByteToWideChar
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
LoadLibraryA
GetProcAddress
SetHandleCount
GetModuleHandleA
user32
GetSysColorBrush
GetMenuItemInfoA
InflateRect
GetMessageA
TranslateMessage
GetCursorPos
ValidateRect
ShowOwnedPopups
PostQuitMessage
CreateDialogIndirectParamA
GetNextDlgTabItem
EndDialog
LoadMenuA
DestroyMenu
GetActiveWindow
UnpackDDElParam
ReuseDDElParam
SetCursor
ReleaseCapture
LoadAcceleratorsA
InvalidateRect
InsertMenuItemA
CreatePopupMenu
SetRectEmpty
BringWindowToTop
SetMenu
GetDesktopWindow
TranslateAcceleratorA
EndPaint
BeginPaint
GetWindowDC
ReleaseDC
GetDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
FillRect
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
LoadBitmapA
IsWindowEnabled
ShowWindow
IsDialogMessageA
RegisterWindowMessageA
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassInfoExA
GetClassNameA
SetPropA
GetPropA
RemovePropA
SendDlgItemMessageA
GetFocus
IsWindow
SetFocus
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
SetActiveWindow
DispatchMessageA
BeginDeferWindowPos
EndDeferWindowPos
GetDlgItem
GetTopWindow
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
LoadIconA
PeekMessageA
MapWindowPoints
TrackPopupMenu
GetKeyState
SetForegroundWindow
IsWindowVisible
UpdateWindow
GetClientRect
GetMenu
PostMessageA
GetSubMenu
GetMenuItemID
GetMenuItemCount
GetSysColor
AdjustWindowRectEx
GetParent
ScreenToClient
EqualRect
DeferWindowPos
GetClassInfoA
GetDlgCtrlID
CallWindowProcA
GetWindowLongA
SetWindowLongA
SetWindowPos
OffsetRect
IntersectRect
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetSystemMetrics
CopyRect
PtInRect
GetWindow
wsprintfA
RegisterClassA
CreateWindowExA
SetWindowTextA
DefWindowProcA
UnregisterClassA
MessageBoxA
BroadcastSystemMessageA
SendMessageA
SetTimer
EnableWindow
LoadCursorA
WinHelpA
gdi32
Escape
ExtTextOutA
TextOutA
PtVisible
GetPixel
BitBlt
SelectObject
GetTextExtentPoint32A
CreateFontIndirectA
CreateCompatibleBitmap
CreateSolidBrush
GetDeviceCaps
GetStockObject
CreateCompatibleDC
CreatePatternBrush
DeleteDC
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
RectVisible
DeleteObject
SetMapMode
SetBkMode
RestoreDC
SaveDC
CreateBitmap
GetObjectA
SetBkColor
SetTextColor
GetClipBox
SetViewportOrgEx
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegEnumKeyExA
OpenProcessToken
FreeSid
RevertToSelf
AccessCheck
IsValidSecurityDescriptor
SetSecurityDescriptorOwner
SetSecurityDescriptorGroup
SetSecurityDescriptorDacl
AddAccessAllowedAce
RegQueryValueA
RegOpenKeyA
RegEnumKeyA
RegCreateKeyExA
RegSetValueExA
RegDeleteKeyA
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
ImpersonateSelf
OpenThreadToken
AllocateAndInitializeSid
InitializeSecurityDescriptor
GetLengthSid
InitializeAcl
shell32
DragFinish
DragQueryFileA
ShellExecuteA
comctl32
ord17
ImageList_Draw
ImageList_GetImageInfo
ImageList_Destroy
shlwapi
PathFindFileNameA
PathFindExtensionA
oleaut32
VariantClear
VariantChangeType
VariantInit
Sections
.text Size: 140KB - Virtual size: 136KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 40KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 164KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 76KB - Virtual size: 75KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ