Static task
static1
Behavioral task
behavioral1
Sample
22dd22d4f98ecadda30e35ab612e474c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
22dd22d4f98ecadda30e35ab612e474c.exe
Resource
win10v2004-20231222-en
General
-
Target
22dd22d4f98ecadda30e35ab612e474c
-
Size
468KB
-
MD5
22dd22d4f98ecadda30e35ab612e474c
-
SHA1
a009fd79e4c363d567e13163d466781b41b8f677
-
SHA256
517356f758b410e82188eaebbf6aaa623df332a7baf3a7d2081f79740dcdd518
-
SHA512
6a14688aede75c93ff96e8fb6319718c084ae9481dbec20a6fc3c6ff309850aee7ff19c4cb403178eb5723ef12277c3d07260cb6a4e1d5d1313414f5dee6b040
-
SSDEEP
12288:4o3H1dwbmWCf3sjVSirVB9Oen3LRTUKq/EdZbEYn:4o31miXf3sjJ9O63LRTUKoEdZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 22dd22d4f98ecadda30e35ab612e474c
Files
-
22dd22d4f98ecadda30e35ab612e474c.exe windows:6 windows x86 arch:x86
7df21489f15d8d12d3098a190c3060ce
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
wininet
HttpQueryInfoW
InternetCrackUrlW
InternetOpenW
HttpSendRequestExW
HttpSendRequestW
InternetCloseHandle
InternetConnectW
InternetReadFile
HttpEndRequestW
HttpOpenRequestW
kernel32
lstrcmpiW
LoadLibraryExW
ReadFile
WriteFile
SetFilePointer
CreateFileW
CloseHandle
GetFileSize
CreateDirectoryW
GetTempPathW
GetFileAttributesW
SetLastError
GlobalAlloc
GlobalLock
ExitProcess
CreateProcessA
GlobalUnlock
lstrcmpW
MulDiv
FindFirstFileW
FindClose
GetSystemDefaultLangID
OpenProcess
SetEvent
GetSystemInfo
ReadProcessMemory
GlobalMemoryStatusEx
MoveFileW
GetDriveTypeW
GetComputerNameA
LoadLibraryW
GetCurrentProcessId
SetUnhandledExceptionFilter
FindNextFileW
lstrlenW
GetCommandLineW
InitializeCriticalSection
CreateMutexW
WaitForSingleObject
ReleaseMutex
CreateEventW
DeleteFileW
ResetEvent
GetLocalTime
WideCharToMultiByte
HeapCreate
GetFileSizeEx
UnmapViewOfFile
CreateFileMappingW
MapViewOfFile
lstrcpynW
lstrcpyW
GetCurrentProcess
CreateToolhelp32Snapshot
Sleep
Process32NextW
GetModuleHandleW
FileTimeToSystemTime
GetFileTime
GetModuleHandleExW
FreeLibraryAndExitThread
ExitThread
CreateThread
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
RtlUnwind
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetStartupInfoW
TerminateProcess
UnhandledExceptionFilter
WaitForSingleObjectEx
InitializeCriticalSectionAndSpinCount
LoadLibraryExA
VirtualFree
VirtualAlloc
IsProcessorFeaturePresent
FlushInstructionCache
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
EncodePointer
OutputDebugStringW
IsDebuggerPresent
GetACP
GetStringTypeW
GetFileType
GetDateFormatW
GetTimeFormatW
GetProcessHeap
DeleteCriticalSection
CompareStringW
LCMapStringW
GetTimeZoneInformation
GetConsoleMode
GetStdHandle
ReadConsoleW
GetConsoleCP
SetFilePointerEx
FindFirstFileExW
IsValidCodePage
GetOEMCP
GetProcAddress
HeapDestroy
DecodePointer
HeapAlloc
FindResourceW
LoadResource
RaiseException
HeapReAlloc
GetLastError
MultiByteToWideChar
HeapSize
GetCurrentThreadId
InitializeCriticalSectionEx
LeaveCriticalSection
GetModuleFileNameW
EnterCriticalSection
FreeLibrary
HeapFree
GetCPInfo
SizeofResource
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
SetStdHandle
FlushFileBuffers
WriteConsoleW
Process32FirstW
SetEndOfFile
user32
SendMessageW
GetSystemMetrics
SetWindowTextW
ShowWindow
IsWindow
InvalidateRgn
SetTimer
RedrawWindow
IsDialogMessageW
GetMonitorInfoW
GetDlgCtrlID
ScreenToClient
GetWindowLongW
TranslateMessage
CreateWindowExW
DispatchMessageW
CreateDialogParamW
GetMessageW
PtInRect
DrawTextW
SetCursor
DestroyCursor
MsgWaitForMultipleObjects
wsprintfW
FillRect
MonitorFromWindow
GetWindowTextLengthW
ClientToScreen
DestroyAcceleratorTable
IsChild
SetDlgItemTextW
MapWindowPoints
SetWindowTextA
GetDlgItemTextW
GetSysColor
SetWindowPos
GetDC
GetFocus
GetWindowRect
GetWindow
PeekMessageW
MoveWindow
IsDlgButtonChecked
CreateAcceleratorTableW
SetFocus
LoadCursorW
GetClassNameW
SetCapture
SetWindowLongW
GetClientRect
GetDlgItem
CheckDlgButton
GetDesktopWindow
GetClassInfoExW
GetParent
RegisterWindowMessageW
ReleaseCapture
LoadImageW
InvalidateRect
ReleaseDC
BeginPaint
EndPaint
EnableWindow
GetWindowTextW
DefWindowProcW
DestroyWindow
MessageBoxW
UnregisterClassW
CharNextW
CallWindowProcW
RegisterClassExW
gdi32
GetTextExtentPoint32W
CreateSolidBrush
DeleteObject
GetObjectW
DeleteDC
GetDeviceCaps
GetStockObject
CreateCompatibleDC
SelectObject
CreateCompatibleBitmap
BitBlt
CreateFontIndirectW
SetTextColor
SetBkMode
advapi32
RegSetValueExW
RegEnumKeyExW
RegOpenKeyExW
GetUserNameA
RegQueryValueExW
RegCloseKey
RegQueryInfoKeyW
RegDeleteKeyW
RegDeleteValueW
RegCreateKeyExW
shell32
SHGetSpecialFolderPathW
ShellExecuteW
ole32
CoCreateInstance
CoUninitialize
CoTaskMemAlloc
CoInitialize
StringFromGUID2
CoTaskMemRealloc
CLSIDFromProgID
CreateStreamOnHGlobal
OleInitialize
CLSIDFromString
OleLockRunning
CoInitializeEx
OleUninitialize
CoGetClassObject
CoTaskMemFree
oleaut32
LoadRegTypeLi
VariantInit
LoadTypeLi
OleCreateFontIndirect
SysAllocString
SysStringLen
SafeArrayCreate
SysAllocStringLen
SafeArrayAccessData
VariantClear
SysFreeString
VarUI4FromStr
SafeArrayDestroy
shlwapi
StrStrIW
comctl32
InitCommonControlsEx
ws2_32
WSAStartup
version
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
psapi
EnumProcessModules
GetModuleFileNameExW
GetProcessMemoryInfo
GetModuleFileNameExA
GetModuleInformation
Sections
.text Size: 290KB - Virtual size: 289KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 71KB - Virtual size: 70KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 83KB - Virtual size: 82KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ