Static task
static1
Behavioral task
behavioral1
Sample
284ce401029bc0fdb43c27a49c9c8361.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
284ce401029bc0fdb43c27a49c9c8361.exe
Resource
win10v2004-20231222-en
General
-
Target
284ce401029bc0fdb43c27a49c9c8361
-
Size
1.5MB
-
MD5
284ce401029bc0fdb43c27a49c9c8361
-
SHA1
30fe3fc7d7a6e2a2e08160ec9a9bf249d180defe
-
SHA256
7a78176733ff98cec7100fc0a55ec6e8f741f7e94e23528619f3f3a1933d4790
-
SHA512
31bd0171d1bee764f2b7c273de28204cade47fb4676f02c40b536c67e6febc0b72feac912cdea95ac6c590c09117be4a3e93014163010f4363b6e9ed3d62dfa6
-
SSDEEP
24576:AAW/mZ41ODP7jUe6WOZuh2T1qJ0grkey03F+eJmspJZ0p6DVnWj6v966uGii:AXL1OXP+K2T8Fly01+43W+F6e
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 284ce401029bc0fdb43c27a49c9c8361
Files
-
284ce401029bc0fdb43c27a49c9c8361.exe windows:6 windows x86 arch:x86
50cb565546c10bfbbd3cf9f097bafd45
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
SHGetFolderPathW
ShellExecuteExW
DuplicateIcon
ExtractIconExW
wsock32
send
socket
ioctlsocket
recv
htonl
htons
gethostbyname
select
connect
WSAStartup
ntohl
gdiplus
GdipSetSmoothingMode
GdipDrawImageRectI
GdipDeleteGraphics
GdipCreateFromHDC
GdipDisposeImage
GdipCreateSolidFill
GdipCloneBrush
GdipDeleteBrush
GdipAlloc
GdipFree
GdiplusShutdown
GdiplusStartup
GdipLoadImageFromStream
GdipCloneImage
GdipGetImageBounds
GdipSetCompositingQuality
kernel32
ReadFile
GetConsoleMode
GetConsoleCP
HeapSize
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
lstrlenW
Sleep
SetLastError
EnterCriticalSection
LeaveCriticalSection
GetCurrentThreadId
RaiseException
DeleteCriticalSection
GetLastError
InitializeCriticalSectionAndSpinCount
ResetEvent
WaitForSingleObject
MulDiv
DecodePointer
GetCommandLineW
GetLongPathNameW
GetModuleFileNameW
GetTempPathW
CreateMutexW
CreateEventW
CloseHandle
CreateThread
GetProcAddress
LocalFree
GetCurrentProcessId
GetModuleHandleW
SizeofResource
CreateFileW
GetFileAttributesW
LockResource
QueryPerformanceFrequency
LoadResource
FindResourceW
GetWindowsDirectoryW
FreeLibrary
QueryPerformanceCounter
LoadLibraryExW
GlobalAlloc
GlobalFree
GlobalLock
GlobalUnlock
FileTimeToSystemTime
FileTimeToLocalFileTime
SystemTimeToFileTime
GetDateFormatW
GetVolumeInformationW
DeviceIoControl
GetVersionExW
ReadConsoleW
LoadLibraryW
GlobalReAlloc
TlsGetValue
TlsFree
TlsAlloc
GetSystemDirectoryW
GetACP
WriteFile
GetStdHandle
ExitProcess
HeapReAlloc
GetModuleHandleExW
ExitThread
GetTimeZoneInformation
FindNextFileW
FindFirstFileExW
FindClose
SystemTimeToTzSpecificLocalTime
GetFileType
CreateDirectoryW
GetCurrentDirectoryW
SetCurrentDirectoryW
SetEnvironmentVariableW
SetEnvironmentVariableA
GetFullPathNameW
GetDriveTypeW
RemoveDirectoryW
DeleteFileW
GetFileAttributesExW
GetCommandLineA
RtlUnwind
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
ReleaseSemaphore
VirtualProtect
GetModuleHandleA
FreeLibraryAndExitThread
GetThreadTimes
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
GetThreadPriority
SetThreadPriority
SwitchToThread
SignalObjectAndWait
CreateTimerQueue
GetStartupInfoW
SetEvent
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCPInfo
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTickCount
SetFilePointerEx
SetStdHandle
IsValidCodePage
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
FlushFileBuffers
WriteConsoleW
SetEndOfFile
GetSystemTime
MultiByteToWideChar
GetSystemTimeAsFileTime
TlsSetValue
GetStringTypeW
GetCurrentThread
WaitForSingleObjectEx
DuplicateHandle
TryEnterCriticalSection
WideCharToMultiByte
OutputDebugStringW
IsDebuggerPresent
LoadLibraryExA
VirtualFree
VirtualAlloc
IsProcessorFeaturePresent
FlushInstructionCache
GetCurrentProcess
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
GetProcessHeap
HeapFree
HeapAlloc
EncodePointer
user32
SendMessageW
GetDC
GetClientRect
MoveWindow
SetWindowTextW
GetWindowRect
ScreenToClient
EndDialog
CreateWindowExW
DefWindowProcW
GetDialogBaseUnits
SetTimer
HideCaret
EndPaint
BeginPaint
SetForegroundWindow
GetSystemMetrics
ClientToScreen
KillTimer
EnumWindows
GetClassNameW
GetWindowThreadProcessId
PostMessageW
GetActiveWindow
DestroyIcon
DialogBoxIndirectParamW
FindWindowW
PostThreadMessageW
DialogBoxParamW
CallWindowProcW
LoadCursorW
GetClassInfoExW
RegisterClassExW
RedrawWindow
ReleaseDC
GetWindowDC
FillRect
GetMessageW
MessageBoxW
GetWindowTextW
SetFocus
CreateDialogParamW
UnregisterClassW
DestroyWindow
GetWindow
GetWindowLongW
MonitorFromWindow
GetMonitorInfoW
GetParent
MapWindowPoints
SetWindowPos
DispatchMessageW
InvalidateRect
ShowWindow
PeekMessageW
UpdateWindow
IsWindow
SetWindowLongW
gdi32
SetBkColor
GetStockObject
SelectObject
CreateSolidBrush
CreateFontIndirectW
CreateFontW
GetTextExtentPoint32W
DeleteDC
DeleteObject
GetDeviceCaps
advapi32
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
IsTextUnicode
ole32
CoInitializeSecurity
CoSetProxyBlanket
CreateStreamOnHGlobal
CoCreateInstance
CLSIDFromProgID
CLSIDFromString
CoUninitialize
CoInitialize
oleaut32
CreateErrorInfo
SysStringByteLen
SysAllocStringByteLen
SysAllocString
VariantClear
VariantInit
VariantCopy
SysFreeString
VariantChangeType
OleLoadPicture
Sections
.text Size: 368KB - Virtual size: 367KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 116KB - Virtual size: 116KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 23KB - Virtual size: 162KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1016KB - Virtual size: 1015KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ