Static task
static1
Behavioral task
behavioral1
Sample
f625b7cb80e76e818e8ca17f27cdfb33.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
f625b7cb80e76e818e8ca17f27cdfb33.exe
Resource
win10v2004-20231215-en
General
-
Target
f625b7cb80e76e818e8ca17f27cdfb33
-
Size
265KB
-
MD5
f625b7cb80e76e818e8ca17f27cdfb33
-
SHA1
020023143c46d64dc256dd16bdd97954b4df4f65
-
SHA256
c648eb887bb2e64a3fdc0bd883a6fe9497e943cb9be4ae0417aaf3ceaa717486
-
SHA512
076b94d26c085cc09815a32b01dc16df1a94055dd16fc395999015ae82c2f8338692408920137931a5c1bdf447afedc61faaf2a24b0fc7ad76cdb301cfc84faf
-
SSDEEP
6144:2cGO14/+RTBcPNt6MxyR6fBgRHJBgb/W8J9:2cE/+xBcPDxyVRSf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f625b7cb80e76e818e8ca17f27cdfb33
Files
-
f625b7cb80e76e818e8ca17f27cdfb33.exe windows:4 windows x86 arch:x86
f3b66d015898fb48e7b49c6e740af845
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ole32
GetHGlobalFromStream
StgCreateDocfileOnILockBytes
CoGetMalloc
ReleaseStgMedium
CreateBindCtx
CoDisconnectObject
MkParseDisplayName
CoUnmarshalInterface
CoDisconnectObject
WriteClassStm
CoReleaseMarshalData
CLSIDFromProgID
OleRegGetUserType
StringFromIID
CoCreateInstanceEx
CoRevokeClassObject
OleRun
CoCreateFreeThreadedMarshaler
CoCreateGuid
OleRun
OleCreateStaticFromData
CoRegisterClassObject
CoGetContextToken
CreateOleAdviseHolder
CoGetMalloc
CoDisconnectObject
CreateStreamOnHGlobal
CoGetObjectContext
advapi32
RegCreateKeyA
RegEnumKeyA
RegQueryInfoKeyA
RegDeleteValueA
RegOpenKeyA
RegDeleteKeyA
RegCreateKeyA
GetLengthSid
comdlg32
ChooseColorA
ChooseColorA
GetOpenFileNameA
GetFileTitleA
GetSaveFileNameA
FindTextA
FindTextA
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerInstallFileA
VerQueryValueA
ntdll
wcscat
_wcsnicmp
user32
BeginPaint
GetMenuItemInfoA
ShowScrollBar
GetClipboardData
GetMenuItemCount
SetWindowTextA
CharNextA
IsWindowVisible
GetClassInfoA
GetDCEx
DefWindowProcA
FillRect
EnableScrollBar
BeginDeferWindowPos
GetMessagePos
CreateWindowExA
DrawMenuBar
DrawEdge
DispatchMessageW
IsChild
GetClientRect
GetParent
GetSubMenu
ShowWindow
CreateMenu
GetCursorPos
CheckMenuItem
GetScrollPos
CallNextHookEx
FrameRect
GetMenuState
DeferWindowPos
GetSysColor
GetMenuItemID
EnumChildWindows
CreatePopupMenu
GetScrollInfo
GetDlgItem
SystemParametersInfoA
DrawIcon
CharLowerBuffA
MessageBoxA
GetMenu
GetClassLongA
CharToOemA
GetLastActivePopup
GetFocus
GetForegroundWindow
GetCapture
DrawTextA
EndDeferWindowPos
DispatchMessageA
RegisterClassA
SetCursor
SetTimer
EnableMenuItem
SetWindowPos
EqualRect
HideCaret
GetKeyNameTextA
DrawFrameControl
GetWindowTextA
EnableWindow
CallWindowProcA
GetKeyState
EndPaint
IsDialogMessageA
GetDC
DrawIconEx
IsMenu
FindWindowA
IsWindowEnabled
GetSysColorBrush
HideCaret
GetActiveWindow
IsMenu
SetWindowLongA
GetCursor
EnumWindows
CreateIcon
GetClipboardData
FillRect
IsChild
CreateWindowExA
ShowScrollBar
IsDialogMessageA
RegisterClassA
EnumThreadWindows
GetSubMenu
SetWindowTextA
GetCursorPos
GetWindow
CallNextHookEx
EnableScrollBar
GetScrollPos
GetClassLongA
GetMessagePos
FrameRect
CreateMenu
GetForegroundWindow
DrawEdge
SystemParametersInfoA
GetPropA
GetMenuItemInfoA
EnableMenuItem
CharToOemA
DefMDIChildProcA
DrawIcon
GetSysColor
CheckMenuItem
TrackPopupMenu
GetDC
DrawTextA
EndDeferWindowPos
GetMenuItemCount
EnumChildWindows
GetParent
GetDlgItem
DefWindowProcA
GetMenuItemID
IsWindowEnabled
DrawIconEx
GetKeyState
GetMenuState
CallWindowProcA
SetTimer
ClientToScreen
GetIconInfo
MessageBoxA
GetClientRect
GetSysColorBrush
BeginPaint
CharNextA
GetScrollRange
GetKeyNameTextA
IsWindowVisible
GetFocus
GetMenu
DrawMenuBar
SetCursor
EndPaint
CharLowerA
DefFrameProcA
GetScrollInfo
BeginDeferWindowPos
shell32
SHGetFileInfoA
SHGetFolderPathA
SHGetDiskFreeSpaceA
Shell_NotifyIconA
SHGetFileInfoA
SHGetDesktopFolder
comctl32
ImageList_DragShowNolock
ImageList_Create
ImageList_Draw
ImageList_Destroy
ImageList_Write
ImageList_DrawEx
ImageList_GetBkColor
ImageList_Read
ImageList_Remove
oleaut32
SysReAllocStringLen
SafeArrayGetElement
SysFreeString
SysStringLen
SafeArrayCreate
VariantCopyInd
GetErrorInfo
OleLoadPicture
VariantChangeType
shlwapi
SHGetValueA
SHQueryValueExA
SHQueryInfoKeyA
SHSetValueA
SHEnumValueA
PathIsDirectoryA
PathFileExistsA
SHStrDupA
SHDeleteKeyA
SHSetValueA
SHDeleteValueA
SHGetValueA
PathIsContentTypeA
SHEnumValueA
SHQueryValueExA
PathGetCharTypeA
msvcrt
time
atol
calloc
exit
memset
memmove
strncmp
memcpy
wcscspn
sprintf
sqrt
wcschr
mbstowcs
wcsncmp
gdi32
CreateDIBitmap
CreateFontIndirectA
GetPaletteEntries
LineTo
kernel32
RaiseException
CloseHandle
lstrcpyA
GetStartupInfoA
SetThreadLocale
ReadFile
GetOEMCP
LocalFree
CreateEventA
GetVersion
GetThreadLocale
GetFileSize
LocalAlloc
GetUserDefaultLCID
FindResourceA
ExitProcess
GetVersionExA
GetCurrentProcess
GetTickCount
GetFileType
GlobalAlloc
GetDiskFreeSpaceA
SetEndOfFile
GetFileAttributesA
ResetEvent
DeleteCriticalSection
HeapAlloc
GlobalFindAtomA
VirtualAllocEx
SizeofResource
GetLocalTime
GetCPInfo
GetStdHandle
GetCommandLineA
GetDateFormatA
GetLastError
GetCurrentThreadId
FreeResource
lstrcmpiA
WaitForSingleObject
SetEvent
DeleteFileA
SetLastError
GetModuleFileNameA
LoadLibraryA
VirtualFree
ExitThread
GlobalAddAtomA
Sleep
InitializeCriticalSection
MoveFileA
WriteFile
GetCurrentThread
GetLocaleInfoA
LoadLibraryExA
GetFullPathNameA
GlobalDeleteAtom
WideCharToMultiByte
lstrcpynA
LoadResource
EnterCriticalSection
LocalReAlloc
CreateFileA
FormatMessageA
GetProcessHeap
GetStringTypeA
LockResource
MoveFileExA
CompareStringA
GetCurrentProcessId
FindFirstFileA
GetSystemDefaultLangID
GetStringTypeW
HeapDestroy
VirtualAlloc
GetEnvironmentStrings
GetACP
SetFilePointer
lstrlenA
GetModuleHandleA
VirtualQuery
CreateThread
HeapFree
MulDiv
FindClose
FreeLibrary
SetHandleCount
lstrcatA
GetLocalTime
GetCommandLineA
GetProcAddress
SetThreadLocale
GetStringTypeA
GetEnvironmentStrings
ReadFile
LoadLibraryA
VirtualFree
GetDiskFreeSpaceA
ExitThread
GetStringTypeW
GlobalAddAtomA
SizeofResource
Sleep
WaitForSingleObject
GetFileAttributesA
GetCurrentThreadId
FindFirstFileA
FreeLibrary
SetFilePointer
InitializeCriticalSection
LoadResource
GetSystemDefaultLangID
GetOEMCP
GetDateFormatA
MulDiv
ExitProcess
GetModuleFileNameA
GetCurrentProcessId
LocalFree
GetLastError
HeapDestroy
CreateThread
GetTickCount
LocalAlloc
lstrcpyA
LockResource
GetVersion
FormatMessageA
EnumCalendarInfoA
lstrcmpiA
VirtualQuery
FindClose
GetThreadLocale
VirtualAllocEx
GlobalFindAtomA
HeapAlloc
lstrlenA
GetCPInfo
GetUserDefaultLCID
GlobalAlloc
GetCurrentThread
ResetEvent
FreeResource
GetFullPathNameA
GetLocaleInfoA
MoveFileExA
CreateEventA
GetACP
GetFileSize
GetStdHandle
RaiseException
SetEvent
DeleteFileA
GlobalDeleteAtom
MoveFileA
SetLastError
CreateFileA
GetModuleHandleA
LocalReAlloc
GetProcessHeap
SetHandleCount
FindResourceA
WideCharToMultiByte
CloseHandle
GetCurrentProcess
LoadLibraryExA
VirtualAlloc
GetFileType
CompareStringA
SetErrorMode
WriteFile
DeleteCriticalSection
lstrcpynA
GetOEMCP
GlobalDeleteAtom
CreateThread
ExitThread
SetErrorMode
EnumCalendarInfoA
GetDateFormatA
GetDiskFreeSpaceA
MoveFileA
GetCurrentThread
lstrcpynA
GetFileSize
lstrcatA
LoadResource
WriteFile
MulDiv
SetThreadLocale
GetStdHandle
InitializeCriticalSection
GetProcAddress
GetCurrentProcess
GetStringTypeW
GetStartupInfoA
LockResource
GetLastError
EnterCriticalSection
ResetEvent
SetHandleCount
FindClose
HeapAlloc
VirtualFree
CreateEventA
GetCurrentThreadId
VirtualQuery
GetVersionExA
LocalAlloc
lstrcpyA
LocalFree
GetUserDefaultLCID
GetModuleHandleA
LocalReAlloc
HeapDestroy
VirtualAlloc
ReadFile
MoveFileExA
WideCharToMultiByte
GetLocalTime
LoadLibraryA
SetLastError
GetLocaleInfoA
GetCommandLineA
SetEvent
RaiseException
lstrcmpiA
FreeResource
GetTickCount
GlobalAlloc
SetEndOfFile
GetFileType
VirtualAllocEx
SizeofResource
lstrcmpA
GlobalFindAtomA
GetProcessHeap
CompareStringA
FreeLibrary
GetVersion
GetCPInfo
CreateFileA
DeleteCriticalSection
FindResourceA
FindFirstFileA
GetFileAttributesA
Sections
.text Size: 53KB - Virtual size: 53KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.init Size: 198KB - Virtual size: 198KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: 1024B - Virtual size: 645B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ