Static task
static1
Behavioral task
behavioral1
Sample
006ae0e8a865f0955206596a5e0cb2f8.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
006ae0e8a865f0955206596a5e0cb2f8.exe
Resource
win10v2004-20231215-en
General
-
Target
006ae0e8a865f0955206596a5e0cb2f8
-
Size
480KB
-
MD5
006ae0e8a865f0955206596a5e0cb2f8
-
SHA1
504651cb951e24386a0ad7b99539d6290b99dcc9
-
SHA256
597dbf3ee3c0e0e577d7bc2bbbc697d6fc588bd0ed34b2bad987649f9bc0e6ca
-
SHA512
188267c30c9cb51e3f432bd6b72cbfc1834094d4da6fb1caeb70f78c8dff6400f653690c05e5dbcbb7194d3acd280ce87b819e9c57319d7908d87b11d1bed0f8
-
SSDEEP
6144:t/cZ2U2ha555QLnb/gLN6rZD3Hik+Y7TzTYL7JcYEo4lG9iC5RdbyrqD:t/q2UDY/gL4VjhDPzUOQgGMC5R8r
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 006ae0e8a865f0955206596a5e0cb2f8
Files
-
006ae0e8a865f0955206596a5e0cb2f8.exe windows:4 windows x86 arch:x86
38575832ba772ceb160b6d9c6c527d84
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
iphlpapi
GetAdaptersInfo
shlwapi
PathRemoveFileSpecA
netapi32
Netbios
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
user32
DrawTextA
TabbedTextOutA
RedrawWindow
GetParent
EnumDisplayDevicesA
CopyRect
GetSysColor
FillRect
InvalidateRect
PostMessageA
LoadImageA
SetRect
GetDC
ReleaseDC
SetWindowPos
SetCursor
OffsetRect
TrackMouseEvent
GetWindowRect
LoadCursorA
HideCaret
ShowCaret
ExcludeUpdateRgn
DefDlgProcA
GetClassLongA
SetPropA
GetPropA
CallWindowProcA
RemovePropA
MessageBoxA
GrayStringA
GetForegroundWindow
GetWindowThreadProcessId
AttachThreadInput
KillTimer
SystemParametersInfoA
SetTimer
IsIconic
GetSystemMetrics
DrawIcon
ScreenToClient
GetClientRect
PtInRect
SendMessageA
PostQuitMessage
TrackPopupMenu
GetCursorPos
SetMenuDefaultItem
GetSubMenu
LoadMenuA
GetDesktopWindow
IsWindowVisible
GetFocus
DestroyIcon
SetCapture
TranslateMessage
DispatchMessageA
LoadIconA
RegisterWindowMessageA
FindWindowA
IsWindow
GetLastActivePopup
BringWindowToTop
LoadBitmapA
SetForegroundWindow
GetMessageTime
GetMessagePos
IntersectRect
GetWindowPlacement
ClientToScreen
IsRectEmpty
EnableWindow
GetCapture
IsWindowUnicode
PostThreadMessageA
RegisterClipboardFormatA
MessageBeep
CopyAcceleratorTableA
LoadStringA
CharUpperA
CharNextA
AdjustWindowRectEx
GetTopWindow
IsChild
WinHelpA
wsprintfA
DrawFrameControl
SetRectEmpty
SetWindowRgn
RegisterClassExA
GetSysColorBrush
ReleaseCapture
SetWindowsHookExA
UnhookWindowsHookEx
EqualRect
CallNextHookEx
UnionRect
DestroyMenu
DestroyCursor
GetWindowLongA
GetNextDlgTabItem
GetActiveWindow
WindowFromPoint
TrackPopupMenuEx
DrawFocusRect
FrameRect
DrawStateA
DefWindowProcA
EndPaint
BeginPaint
UpdateWindow
ShowWindow
CreateWindowExA
GetMessageA
UnregisterClassA
DestroyWindow
SetWindowLongA
GetClassNameA
MapWindowPoints
DrawEdge
GetNextDlgGroupItem
SetWindowTextA
GetClassInfoA
RegisterClassA
SetFocus
MoveWindow
GetDlgCtrlID
GetWindowTextLengthA
GetWindowTextA
IsDialogMessageA
SendDlgItemMessageA
MapDialogRect
GetWindow
SetWindowContextHelpId
EndDialog
SetActiveWindow
CreateDialogIndirectParamA
GetDlgItem
GetWindowDC
GetMenuCheckMarkDimensions
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetKeyState
ValidateRect
PeekMessageA
IsWindowEnabled
GetMenuItemID
GetMenuItemCount
InflateRect
GetMenu
kernel32
OpenProcess
lstrcmpiA
Process32First
GetSystemDirectoryA
LoadLibraryA
GetModuleFileNameA
FreeLibrary
SetCurrentDirectoryA
FindFirstFileA
MoveFileA
ExitProcess
GetVersionExA
GetCurrentThreadId
DeviceIoControl
CreateFileA
SetPriorityClass
MulDiv
SetFileAttributesA
CreateEventA
GlobalFree
GlobalUnlock
GlobalLock
ResumeThread
GlobalAlloc
LockResource
SizeofResource
LoadResource
FindResourceA
WaitForSingleObject
ResetEvent
SetEvent
GetPriorityClass
MultiByteToWideChar
LocalFree
FormatMessageA
ExpandEnvironmentStringsA
GetVolumeInformationA
GetDiskFreeSpaceExA
GetDriveTypeA
GetProfileStringA
QueryPerformanceCounter
QueryPerformanceFrequency
HeapFree
HeapAlloc
GetProcessHeap
GetVersion
TerminateThread
GetProcAddress
CreateDirectoryA
GetTickCount
FindClose
FindNextFileA
GetModuleHandleA
GetShortPathNameA
MoveFileExA
LeaveCriticalSection
GetLocalTime
EnterCriticalSection
InitializeCriticalSection
DeleteCriticalSection
WriteFile
ReadFile
GetFileSize
GetCurrentThread
lstrcmpA
GlobalDeleteAtom
SetLastError
InterlockedIncrement
InterlockedDecrement
lstrlenA
WideCharToMultiByte
lstrcpyA
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
lstrcatA
GetThreadLocale
lstrcpynA
DuplicateHandle
SetFilePointer
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
GetFullPathNameA
LocalAlloc
TlsAlloc
GlobalHandle
TlsFree
GlobalReAlloc
TlsSetValue
LocalReAlloc
TlsGetValue
GlobalFlags
WritePrivateProfileStringA
GetProcessVersion
GetCPInfo
GetOEMCP
GetFileAttributesA
GetFileTime
SetErrorMode
RtlUnwind
CreateThread
ExitThread
GetStartupInfoA
GetCommandLineA
RaiseException
GetTimeZoneInformation
GetSystemTime
GetACP
SetStdHandle
GetFileType
HeapReAlloc
HeapSize
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
UnhandledExceptionFilter
LCMapStringA
LCMapStringW
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetExitCodeProcess
TerminateProcess
Process32Next
DeleteFileA
GetCurrentProcess
FileTimeToLocalFileTime
FileTimeToSystemTime
CreateProcessA
CreateMutexA
GetLastError
ReleaseMutex
Sleep
CreateToolhelp32Snapshot
Module32First
CloseHandle
gdi32
CombineRgn
GetTextExtentPointA
PatBlt
CreatePen
LineTo
MoveToEx
IntersectClipRect
GetClipBox
ScaleWindowExtEx
SetWindowExtEx
SetWindowOrgEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetBkMode
RestoreDC
SaveDC
SelectClipRgn
GetPixel
CreateBitmap
SetBkColor
SetTextColor
CreateDIBitmap
GetStockObject
StretchBlt
Escape
TextOutA
RectVisible
PtVisible
LPtoDP
GetMapMode
GetWindowExtEx
GetViewportExtEx
DPtoLP
GetCurrentObject
GetBkColor
GetTextColor
GetBkMode
GetTextExtentPoint32A
CreateRectRgn
ExtTextOutA
CreateSolidBrush
CreateCompatibleBitmap
SelectObject
CreateDCA
DeleteDC
GetDeviceCaps
GetObjectA
CreateFontIndirectA
DeleteObject
CreateCompatibleDC
BitBlt
comdlg32
GetFileTitleA
winspool.drv
ClosePrinter
OpenPrinterA
DocumentPropertiesA
advapi32
RegCloseKey
RegDeleteValueA
RegSetValueExA
RegCreateKeyExA
RegQueryValueExA
RegDeleteKeyA
RegEnumKeyExA
RegOpenKeyA
RegEnumValueA
RegOpenKeyExA
shell32
SHGetSpecialFolderPathA
SHFileOperationA
ShellExecuteExA
Shell_NotifyIconA
SHGetMalloc
ShellExecuteA
comctl32
ord17
_TrackMouseEvent
ImageList_Destroy
oledlg
ord8
ole32
CoRevokeClassObject
CoRegisterMessageFilter
OleUninitialize
OleInitialize
CoTaskMemAlloc
CoTaskMemFree
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CLSIDFromString
CLSIDFromProgID
CoCreateInstance
CreateStreamOnHGlobal
CoUninitialize
CoInitialize
OleFlushClipboard
OleIsCurrentClipboard
CoFreeUnusedLibraries
olepro32
ord253
ord251
oleaut32
SysFreeString
SysStringLen
SysAllocStringByteLen
VariantCopy
SysAllocStringLen
SysAllocString
VariantChangeType
VariantTimeToSystemTime
VariantClear
urlmon
URLDownloadToFileA
wininet
HttpSendRequestA
HttpOpenRequestA
InternetConnectA
InternetQueryDataAvailable
InternetReadFile
InternetWriteFile
InternetSetFilePointer
InternetSetStatusCallback
InternetSetOptionExA
InternetOpenUrlA
InternetCloseHandle
InternetOpenA
InternetQueryOptionA
InternetCanonicalizeUrlA
InternetCrackUrlA
DeleteUrlCacheEntry
InternetGetConnectedState
InternetGetLastResponseInfoA
rpcrt4
UuidCreate
UuidToStringA
RpcStringFreeA
Sections
.text Size: 288KB - Virtual size: 286KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 136KB - Virtual size: 135KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 28KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ