Static task
static1
Behavioral task
behavioral1
Sample
178d2fd781431414ee2f8c1472bbf114.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
178d2fd781431414ee2f8c1472bbf114.exe
Resource
win10v2004-20231215-en
General
-
Target
178d2fd781431414ee2f8c1472bbf114
-
Size
4.8MB
-
MD5
178d2fd781431414ee2f8c1472bbf114
-
SHA1
45a3b41bc1b600995ebec9e9004c15ef96f576d7
-
SHA256
c410c21dd36d6091fec4f8db9f765d2bee45b7f50ca43a822944eebcea0a66d1
-
SHA512
6b5150e683b2c10531eed7fa287309b1203a1ca0f6dd416c595818d659b9ec9b0efb8a603a1e41901601f6b88023d23975c56f168bc995662da419fe1fe35e04
-
SSDEEP
98304:8oW3plYAP9szkiJNvXzFhLU5JJA29y8i3X3ENVMjKkH6dFBa:Q1P9B2bLU582LwE76H6dX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 178d2fd781431414ee2f8c1472bbf114
Files
-
178d2fd781431414ee2f8c1472bbf114.exe windows:5 windows x86 arch:x86
dbe78e87aa5172dbedb9d383b2198cd3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
ShellExecuteExW
DuplicateIcon
SHGetFolderPathW
ExtractIconExW
wsock32
WSAStartup
gethostbyname
select
ntohl
ioctlsocket
send
socket
connect
recv
htonl
htons
gdiplus
GdiplusStartup
GdiplusShutdown
GdipFree
GdipAlloc
GdipDeleteBrush
GdipCloneBrush
GdipGetImageBounds
GdipCreateSolidFill
GdipLoadImageFromStream
GdipDrawImageRectI
GdipSetSmoothingMode
GdipSetCompositingQuality
GdipDeleteGraphics
GdipCreateFromHDC
GdipDisposeImage
GdipCloneImage
kernel32
ReadFile
GetConsoleMode
InterlockedDecrement
GetLongPathNameW
lstrlenW
Sleep
SetLastError
EnterCriticalSection
LeaveCriticalSection
GetCurrentThreadId
RaiseException
DeleteCriticalSection
GetLastError
InitializeCriticalSectionAndSpinCount
FreeLibrary
GetProcAddress
GetModuleHandleW
lstrcmpiW
MultiByteToWideChar
SizeofResource
LoadResource
FindResourceW
LoadLibraryExW
GetModuleFileNameW
InterlockedIncrement
DecodePointer
MulDiv
GetCommandLineW
GetTempPathW
CreateMutexW
WaitForSingleObject
CloseHandle
CreateThread
LocalFree
OpenProcess
GetCurrentProcessId
WriteProcessMemory
CreateFileW
GetFileAttributesW
LockResource
QueryPerformanceFrequency
GetWindowsDirectoryW
QueryPerformanceCounter
GlobalAlloc
GlobalFree
GlobalLock
GlobalUnlock
GetVolumeInformationW
DeviceIoControl
GetVersionExW
VirtualAllocEx
VirtualFreeEx
FileTimeToSystemTime
SetEndOfFile
SystemTimeToFileTime
GetDateFormatW
LoadLibraryW
SetFilePointerEx
TlsGetValue
TlsFree
TlsAlloc
GetSystemDirectoryW
GetConsoleCP
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetACP
WriteFile
GetStdHandle
HeapReAlloc
GetTimeZoneInformation
FindNextFileW
FindFirstFileExW
FindClose
SystemTimeToTzSpecificLocalTime
GetFileType
CreateDirectoryW
GetCurrentDirectoryW
SetCurrentDirectoryW
SetEnvironmentVariableW
SetEnvironmentVariableA
GetFullPathNameW
GetDriveTypeW
RemoveDirectoryW
DeleteFileW
GetFileAttributesExW
GetCommandLineA
GetModuleHandleExW
ExitProcess
RtlUnwind
GetStartupInfoW
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
WaitForSingleObjectEx
ResetEvent
SetEvent
GetCPInfo
GetLocaleInfoW
LCMapStringW
CompareStringW
GetSystemTimeAsFileTime
TlsSetValue
CreateEventW
GetStringTypeW
WideCharToMultiByte
OutputDebugStringW
IsDebuggerPresent
LoadLibraryExA
VirtualFree
VirtualAlloc
IsProcessorFeaturePresent
FlushInstructionCache
GetCurrentProcess
InterlockedPushEntrySList
InterlockedPopEntrySList
SetStdHandle
ReadConsoleW
IsValidCodePage
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
FlushFileBuffers
GlobalReAlloc
WriteConsoleW
GetSystemTime
InitializeSListHead
GetProcessHeap
HeapFree
HeapAlloc
FileTimeToLocalFileTime
HeapSize
EncodePointer
user32
MessageBoxW
SendMessageW
GetDC
GetClientRect
MoveWindow
SetWindowTextW
GetWindowRect
ScreenToClient
EndDialog
CreateWindowExW
DefWindowProcW
SetWindowLongW
IsWindow
UpdateWindow
PeekMessageW
ShowWindow
InvalidateRect
DispatchMessageW
SetWindowPos
MapWindowPoints
GetParent
GetMonitorInfoW
MonitorFromWindow
SetTimer
HideCaret
EndPaint
BeginPaint
SetForegroundWindow
GetSystemMetrics
ClientToScreen
KillTimer
EnumWindows
GetClassNameW
GetWindowThreadProcessId
PostMessageW
GetActiveWindow
DestroyIcon
DialogBoxIndirectParamW
FindWindowW
PostThreadMessageW
DialogBoxParamW
CallWindowProcW
LoadCursorW
GetClassInfoExW
RegisterClassExW
RedrawWindow
ReleaseDC
GetWindowDC
FillRect
GetMessageW
GetDialogBaseUnits
CharNextW
GetWindowTextW
SetFocus
CreateDialogParamW
UnregisterClassW
DestroyWindow
GetWindow
GetWindowLongW
gdi32
GetStockObject
SelectObject
CreateSolidBrush
CreateFontIndirectW
GetDeviceCaps
CreateFontW
GetTextExtentPoint32W
DeleteDC
DeleteObject
SetBkColor
advapi32
RegCreateKeyExW
RegOpenKeyExW
RegEnumKeyExW
RegQueryInfoKeyW
RegCloseKey
RegQueryValueExW
RegDeleteKeyW
RegDeleteValueW
IsTextUnicode
RegSetValueExW
ole32
GetRunningObjectTable
CoInitializeSecurity
CoSetProxyBlanket
CreateStreamOnHGlobal
CLSIDFromProgID
CLSIDFromString
CoUninitialize
CreateBindCtx
CoInitialize
CoCreateInstance
CoTaskMemAlloc
CoTaskMemRealloc
CoTaskMemFree
oleaut32
CreateErrorInfo
VariantChangeType
SysAllocString
VariantClear
VariantInit
SysFreeString
OleLoadPicture
SysAllocStringByteLen
SysStringByteLen
VarUI4FromStr
SysStringLen
VariantCopy
Sections
.text Size: 279KB - Virtual size: 278KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 109KB - Virtual size: 108KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 19KB - Virtual size: 158KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 1024B - Virtual size: 556B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4.4MB - Virtual size: 4.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ